Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/1644993.1645027acmotherconferencesArticle/Chapter ViewAbstractPublication PagesichitConference Proceedingsconference-collections
research-article

Architecture of electronic surveillance of P2P based VoIP service

Published: 27 August 2009 Publication History

Abstract

Architectures of electronic surveillance of various types of P2P-based VoIP services are described in this paper. There are kinds of architectures of P2P based VoIP service according to the telecommunication networks used including PSTN, mobile network, and VoIP network. In other words, appropriate architecture and points of electronic surveillance of P2P based VoIP services depend on the VoIP service architecture. Hereupon, electronic surveillance architectures of P2P based VoIP service users whose counterpart uses PSTN or VoIP service, and characteristics of each are described.

References

[1]
ATIS-1000678.2006, "Lawfully Authorized Electronic Surveillance (LAES) for Voice over Packet Technologies in Wireline Telecommunications Networks", 2006.
[2]
Wire and Electronic Communications Interception and Interception of Oral Communications, Title 18 of the United States Code, Chapter 119, Sections 2510.
[3]
Communications Assistance for Law Enforcement Act (CALEA), Public Law 103--414, October 25, 1994.

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
ICHIT '09: Proceedings of the 2009 International Conference on Hybrid Information Technology
August 2009
687 pages
ISBN:9781605586625
DOI:10.1145/1644993
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 27 August 2009

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. P2P based VoIP
  2. VoIP ES
  3. electronic surveillance

Qualifiers

  • Research-article

Conference

ICHIT '09

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 13
    Total Downloads
  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 10 Nov 2024

Other Metrics

Citations

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media