共 7 条
[1]
Herculea M., SECURITY
[2]
Jahan S, 2017, PROCEEDINGS OF 2017 INTERNATIONAL CONFERENCE ON NETWORKING, SYSTEMS AND SECURITY (NSYSS), P39, DOI 10.1109/NSysS.2017.7885799
[3]
Kuhn D, 2005, 80058 NAT I STAND TE, V800-58, P1, DOI DOI 10.1177/0037768615587840
[5]
Pu F., P2P ARCHITECTURE IP
[6]
Salman F. A., 2017, INDONES J ELECT ENG, V7, P855, DOI [10.11591/ijeecs.v7.i3.pp855-860, DOI 10.11591/IJEECS.V7.I3.PP855-860]
[7]
Research on Security Mechanisms of SIP-based VoIP System
[J].
HIS 2009: 2009 NINTH INTERNATIONAL CONFERENCE ON HYBRID INTELLIGENT SYSTEMS, VOL 2, PROCEEDINGS,
2009,
:408-410