An implementation and security analysis on H.235 for VoIP security on embedded environments
Vol. 29, No. 7, pp. 1007-1014, Jul. 2004
Abstract
Statistics
Cumulative Counts from November, 2022
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.
|
Cite this article
[IEEE Style]
D. W. Kim, K. Hong, S. Lee, S. Jung, "An implementation and security analysis on H.235 for VoIP security on embedded environments," The Journal of Korean Institute of Communications and Information Sciences, vol. 29, no. 7, pp. 1007-1014, 2004. DOI: .
[ACM Style]
Deok Wu Kim, Kihun Hong, Sang-hak Lee, and Souhwan Jung. 2004. An implementation and security analysis on H.235 for VoIP security on embedded environments. The Journal of Korean Institute of Communications and Information Sciences, 29, 7, (2004), 1007-1014. DOI: .
[KICS Style]
Deok Wu Kim, Kihun Hong, Sang-hak Lee, Souhwan Jung, "An implementation and security analysis on H.235 for VoIP security on embedded environments," The Journal of Korean Institute of Communications and Information Sciences, vol. 29, no. 7, pp. 1007-1014, 7. 2004.