Architecture of electronic surveillance of P2P based VoIP service
Abstract
References
Index Terms
- Architecture of electronic surveillance of P2P based VoIP service
Recommendations
Service quality assurance mechanisms for P2P SIP VoIP
NPC'11: Proceedings of the 8th IFIP international conference on Network and parallel computingRecently P2P (Peer-to-Peer) has been proposed to improve the scalability of the traditional VoIP (voice over IP) systems. However, P2P makes VoIP service unreliable because P2P networks probably scale up and the service nodes are very likely to fail or ...
Lawful Interception in P2P-Based VoIP Systems
Principles, Systems and Applications of IP Telecommunications. Services and Security for Next Generation NetworksLawful Interception of Voice-over-IP communications is technically more challenging than Lawful Interception in the PSTN. Currently, Lawful Interception for Voice-over-IP traffic is being standardised with respect to VoIP service architectures where ...
VoIP: a debate over information service or telephone application in US: a new perspective in convergence era
As new voice-over-IP (VoIP) services rapidly emerge, a debate is growing over how the emerging technology fits into the traditional telecommunications regulation and industrial schemes. The debate on VoIP has been whether VoIP traffic should be ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
- General Chairs:
- Geuk Lee,
- Daniel Howard,
- Jeong Jin Kang,
- Program Chairs:
- Dominik Slezak,
- Tae Nam Ahn,
- Chung-Huang Yang
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Conference
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 13Total Downloads
- Downloads (Last 12 months)0
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
Get Access
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in