ÀÚ·á°Ë»ö-Ç¥ÁØ

Ȩ > ÀڷḶ´ç > ÀÚ·á°Ë»ö > Ç¥ÁØ

ÀÚ·á °Ë»ö°á°ú

°Ë»öÆäÀÌÁö·Î
Ç¥ÁØÁ¾·ù Á¤º¸Åë½Å´ÜüǥÁØ(TTAS)
Ç¥ÁعøÈ£ TTAK.KO-12.0195 ±¸ Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2012-12-21 ÃÑ ÆäÀÌÁö 19
ÇÑ±Û Ç¥ÁØ¸í ¹Î°£ VoIP º¸¾ÈÅë½ÅÀ» À§ÇÑ ¾ÏÈ£ ¾Ë°í¸®Áò
¿µ¹® Ç¥Áظí Cryptographic Algorithms for VoIP Secure Communication in Private Sector
ÇÑ±Û ³»¿ë¿ä¾à º» Ç¥ÁØ¿¡¼­´Â ÀÎÅͳÝÀüÈ­ º¸¾ÈÅë½ÅÀ» Á¦°øÇϱâ À§Çؼ­ ÇÊ¿äÇÑ º¸¾È ¸ÞÄ¿´ÏÁòÀÎ ÀÎÁõ, Á¦¾î½ÅÈ£ ¹× ÅëÈ­³»¿ë ¾Ïȣȭ¿¡ »ç¿ëµÇ´Â ¾ÏÈ£ ¾Ë°í¸®ÁòÀ» Á¤ÀÇÇÑ´Ù. ±×¸®°í º¸¾ÈÅë½ÅÀ» Á¦°øÇϴµ¥ À־ ¹Ýµå½Ã ÇÊ¿äÇÑ ¾Ïȣ۸¦ °øÀ¯ÇÏ´Â ¹æ¹ý¿¡ ´ëÇØ¼­µµ ±â¼úÇÑ´Ù. ¶ÇÇÑ ºÎ·Ï¿¡¼­ VoIP º¸¾ÈÅë½ÅÀ» À§ÇÑ º¸¾ÈÇÁ·ÎÅäÄÝ¿¡¼­ ½ÇÁ¦ ¾Ïȣȭ¿¡ »ç¿ë °¡´ÉÇÑ ¾Ë°í¸®ÁòÀÇ ¿¹¸¦ ¸í½ÃÇÑ´Ù.
¿µ¹® ³»¿ë¿ä¾à This standard specifies cryptographic suites to use authentication, encryption for VoIP secure communication. And it describes key management scheme for VoIP secure communication. Also, it specifies cryptographic algorithms for VoIP secure communication in appendix.
°ü·Ã IPR È®¾à¼­ Á¢¼öµÈ IPR È®¾à¼­ ¾øÀ½
°ü·ÃÆÄÀÏ    TTAK.KO-12.0195_ed15.pdf TTAK.KO-12.0195_ed15.pdf
Ç¥ÁØÀÌ·Â
Ç¥Áظí Ç¥ÁعøÈ£ Á¦°³Á¤ÀÏ ±¸ºÐ À¯È¿
¿©ºÎ
IPR
È®¾à¼­
ÆÄÀÏ
¹Î°£ VoIP º¸¾ÈÅë½ÅÀ» À§ÇÑ ¾ÏÈ£ ¾Ë°í¸®Áò TTAK.KO-12.0195 2012-12-21 Á¦Á¤ À¯È¿ ¾øÀ½ TTAK.KO-12.0195_ed15.pdf
Ç¥ÁØÀ¯Áöº¸¼öÀÌ·Â
°ËÅäÀÏÀÚ °ËÅä°á°ú °ËÅä³»¿ë
2016-06-08 À¯Áö -