This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Voices, I Hear Voices
July/August 2006 (vol. 4 no. 4)
pp. 80-83
Iv? Arce, Core Security Technologies
Today, more than 130 years after the telephone's invention, we face the difficult task of reconciling the prodigal children of the two great men quoted above within the confines of our computer networks. The assignment is far from easy, considering that men from telephony and computing worlds have substantially different philosophies, idiosyncrasies, technologies, business models, entry barriers, and operational characteristics. In this installment of Attack Trends, I delve into the new security and privacy challenges the ongoing widespread adoption of IP telephony and voice over IP (VoIP) pose.
Index Terms:
IP telephony, telephony, voice over IP, VoIP, telephone, computer networks
Citation:
Iv? Arce, "Voices, I Hear Voices," IEEE Security & Privacy, vol. 4, no. 4, pp. 80-83, July-Aug. 2006, doi:10.1109/MSP.2006.107
Usage of this product signifies your acceptance of the Terms of Use.