Issue No. 04 - July/August (2006 vol. 4)
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/MSP.2006.107
Iv? Arce , Core Security Technologies
Today, more than 130 years after the telephone's invention, we face the difficult task of reconciling the prodigal children of the two great men quoted above within the confines of our computer networks. The assignment is far from easy, considering that men from telephony and computing worlds have substantially different philosophies, idiosyncrasies, technologies, business models, entry barriers, and operational characteristics. In this installment of Attack Trends, I delve into the new security and privacy challenges the ongoing widespread adoption of IP telephony and voice over IP (VoIP) pose.
IP telephony, telephony, voice over IP, VoIP, telephone, computer networks
Iv? Arce, "Voices, I Hear Voices", IEEE Security & Privacy, vol. 4, no. , pp. 80-83, July/August 2006, doi:10.1109/MSP.2006.107