Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ TTAK.KO-12.0195 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2012-12-21 ÃÑÆäÀÌÁö 19
ÇѱÛÇ¥ÁØ¸í ¹Î°£ VoIP º¸¾ÈÅë½ÅÀ» À§ÇÑ ¾ÏÈ£ ¾Ë°í¸®Áò
¿µ¹®Ç¥Áظí Cryptographic Algorithms for VoIP Secure Communication in Private Sector
Çѱ۳»¿ë¿ä¾à º» Ç¥ÁØ¿¡¼­´Â ÀÎÅͳÝÀüÈ­ º¸¾ÈÅë½ÅÀ» Á¦°øÇϱâ À§Çؼ­ ÇÊ¿äÇÑ º¸¾È ¸ÞÄ¿´ÏÁòÀÎ ÀÎÁõ, Á¦¾î½ÅÈ£ ¹× ÅëÈ­³»¿ë ¾Ïȣȭ¿¡ »ç¿ëµÇ´Â ¾ÏÈ£ ¾Ë°í¸®ÁòÀ» Á¤ÀÇÇÑ´Ù. ±×¸®°í º¸¾ÈÅë½ÅÀ» Á¦°øÇϴµ¥ À־ ¹Ýµå½Ã ÇÊ¿äÇÑ ¾Ïȣ۸¦ °øÀ¯ÇÏ´Â ¹æ¹ý¿¡ ´ëÇؼ­µµ ±â¼úÇÑ´Ù. ¶ÇÇÑ ºÎ·Ï¿¡¼­ VoIP º¸¾ÈÅë½ÅÀ» À§ÇÑ º¸¾ÈÇÁ·ÎÅäÄÝ¿¡¼­ ½ÇÁ¦ ¾Ïȣȭ¿¡ »ç¿ë °¡´ÉÇÑ ¾Ë°í¸®ÁòÀÇ ¿¹¸¦ ¸í½ÃÇÑ´Ù.
¿µ¹®³»¿ë¿ä¾à This standard specifies cryptographic suites to use authentication, encryption for VoIP secure communication. And it describes key management scheme for VoIP secure communication. Also, it specifies cryptographic algorithms for VoIP secure communication in appendix.
±¹Á¦Ç¥ÁØ
°ü·ÃÆÄÀÏ TTAK.KO-12.0195_ed15.pdf TTAK.KO-12.0195_ed15.pdf            

ÀÌÀü
oneM2M - Management Enablement (BBF) v2.2.1
´ÙÀ½
oneM2M - CoAP Protocol Binding v2.6.1