|
1.古東明、蔡嘉原、林皇伸、魏見安、陳曉蘭、陳麗紋,2006, ”網路電話之垃圾廣告防堵機制探討-採用兩階段黑白名單” ,「網際空間:資安、犯罪與法律社會」學術研究暨實務研討會,台北,11月20日。 2.賈文康,SIP會談啟始協議操典,文魁資訊,2005年10月。 3.D. Kato and T. Kamiya, 2007, “Evaluating DHT Implementations in Complex Environments by Network Emulator”, IPTPS, February. 4.D. Shin, M.K. Consulting, 2006, J. Ahn, T. University, C. Shim, Q. Inc, “Progressive Multi Gray-Leveling: A Voice Spam Protection Algorithm”, IEEE Network, vol. 20, pp.18-24, September/October. 5.Fei Wang, Yijun Mo and Benxiong Huang, 2007, “P2P-AVS: P2P Based Cooperative VoIP Spam Filtering”, WCNC, pp.3547-3552, March. 6.Hongyan Ma, Baomin Xu, Huaxu Wan and Chunyan Li, 2007, “A hierarchical P2P architecture for SIP communication”, NGMAST, pp.130-135, Sep. 7.Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan, Frank Dabek, 2003, “Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications”, IEEE/ACM Transactions on Networking, vol. 11, pp.17-32, February. 8.Jean-Fran�帙is Wauthy and Laurent Schumacher, 2007, “Implementation and Performance Evaluation of a P2PSIP Distributed Proxy/Registrar”, NGMAST, pp.119-124, September. 9.J. Rosenberg, C. Jennings, 2007, “The Session Initiation Protocol (SIP) and Spam”, IETF-Draft, July. 10.J. Rosenberg, H. Schulzrinne, G. Camarillo, A. Johnston, J. Peterson, R. Sparks, M. Handley and E. Schooler, 2002, “SIP: Session Initiation Protocol” , IETF, RFC 3261, June. 11.K. Khavari, N. Abji, R. Farha, C. Liang, A. Tizghadam, F. Fadaie, A. Leon-Garcia, 2006, “Structured Peer-to-Peer Control Plane”, ICC, pp.48-56, June. 12.K.K. Dhara, V. Krishnaswamy and S. Baset, 2006, “Dynamic peer-to-peer overlays for voice systems”, PERCOMW, pp.6, March. 13.M. Hansen, 2006, “Countering SPAM over Internet Telephony (SPIT)”, International Symposium Privacy and Security in Internet Telephony / VoIP, September. 14.M. Zangrilli and D. Bryan, 2007, “A Chord-based DHT for Resource Lookup in P2PSIP”, IETF-Draft, February. 15.N. Banerjee, S. Saklikar and S. Saha, 2006, “Anti vamming Trust Enforcement in Peertopeer VoIP Networks”, IWCMC, pp.201-206, July. 16.Y. Rebahi, D. Sisalem, T. Magedanz, 2006, “SIP Spam Detection”, ICDT, pp.68-68, June. 17.S. Cirani, L. Veltri, 2007, “A Kademlia-based DHT for Resource Lookup in P2PSIP”, IETF-Draft, October. 18.S. Kundan and S. Henning, 2005, “Peer-to-Peer Internet Telephony using SIP”, NOSSDAV, pp.63-68, June.
|