Login / Signup
VISOR: VoIP Security Using Reputation.
Weilai Yang
Paul Judge
Published in:
ICC (2008)
Keyphrases
</>
information security
security issues
access control
quality of service
intrusion detection
security threats
ip networks
trust relationships
trust management
computer security
security mechanisms
security requirements
network security
key management
security policies
network architecture
security systems
real time