Explore
Featured
Recent
Articles
Topics
Login
Upload
Featured
Recent
Articles
Topics
Login
Upload
Search Results for ''
published presentations and documents on DocSlides.
Voice over IP (VoIP) security
by celsa-spraggs
Introduction. Voice over IP and IP telephony. Net...
Securing the UC Network Terry Pierson
by sherrill-nordquist
Consulting System Engineer. UC Security - AVAYA. ...
Secure by design Thomas
by giovanna-bartolotta
Poett. Zahid. Saeed (MSFT). OFC-B325. Lync: Secu...
Communications Security
by lindy-dunigan
Report to The Industry. Mark D. Collier. Chief Te...
ICE, Turn, Stun and Security
by tatiana-dople
Session: D2-1. Tsahi. . Levent. -Levi. Director,...
Improving Security of
by marina-yarberry
Real-time Communications. SIPNOC 2016. Herndon, V...
Security, Privacy and Encryption
by berey
in Mobile Networks. Gyan . Ranjan. Narus Inc. . No...
Security Management Considerations of “
by evans
TNAuthList. by Reference” Proposed Updates to A...
Session Initiation Protocol (SIP) Event Package for the Com
by alexa-scheidler
B. Rosen, H. . Schulzrinne. , H. . Tschofenig. In...
Load More...