论文部分内容阅读
We first discusses some threats to VoIP system and H.323 architectures designed for VoIP communications on security point of view. Continues with presenting security requirements of VoIP, and explaining the essential security constraints surrounding a successful VoIP deployment. Finally, suggests some strategies to implement the security and encryption functions of VoIP system based on H.323.