2Intemet Telephony. Enterprise VOIP Security: Potential Threats and Best Practices. Retrieved on Wednesday, February 28, 2007 from http://www.itdepartment.com/VolP/VoipSecurtyThreats20and% 20Best %20Praetices.pdf.
3Stanton, R. (2006). Secure VoIP - an achievable goal.Computer Fraud & Security, 2006(4).
4VoIV技术与应用.[美]科林斯著,舒华英等译.人民邮电出版社.
5Stefano Salsano,Luca Veltri,Donald Papalilo.SIP Security Issues:The SIP Authentication Procedure and its Processing Load,IEEE Network,NovemberDecember 2002.
6Kumiko Ono,Shinya Tachimoto,Seiichi Sakaya.Security in End-to-end Communications,NTT Technical Review,2004,2(10).
7Yang ChouChen,Wang RenChiun,Liu WeiTing.Secure authentication scheme for session initiation protocol,Computers & Security,In Press,accepted 15 October 2004.
8Richard Kuhn D,Thomas J Walsh,Steffen Fries.Security Considerations for Voices Over IP Systems,National Institute of Standards and Technology Special Publication 800-58,January 2005.
9IETF, H. 323 Standard. http ://www. packetizer. com/voip/h323/standards. html .1996 -05.