參考文獻 |
[1] J. Rosenberg, et al., “SIP: Session Initiation Protocol,” RFC 3261, http://www.ietf.org/rfc/rfc3261.txt?number=3261, Jun. 2002.
[2] Communication Assistance for Law Enforcement Act, “Communications Assistance for Law Enforcement Act of 1994 (CALEA),” Pub. L. No.103~414, 108 Stat. 4279, Congress of the United States of America.
[3] Internet Engineering Steering Group, Internet Architecture Board, “IETF Policy on Wiretapping,” RFC 2804, http://www.ietf.org/rfc/rfc2804.txt?number=2804, May 2000.
[4] OpenH323 Project, http://www.openh323.org/standards.html.
[5] 3GPP TS 23.202, v.6.0.1, “Network architecture,” http://www.3gpp.org/ftp /Specs/html-info/23-series.htm, Mar. 2003.
[6] 3GPP TS 23.228, v.6.1.0, “IP Multimedia Subsystem (IMS),” http://www.3gpp.org/Specs/html-info/23-series.htm, Mar. 2003.
[7] 3GPP TS 24.228, v.5.6.0, “Signaling flows for the IP Multimedia call control based on SIP and SDP,” http://www.3gpp.org/ftp/Specs/html-info/ 24-series.htm, Sep. 2003.
[8] ITU-T Recommendation H.323, “Packet Based Multimedia Communications Systems,” http://www.itu.int/rec/recommendation.asp?type=products&lang=e& parent=T-REC-H, Jul. 2003.
[9] 3GPP, “A Comparison of H.323v4 and SIP,” Nortel Network, http://research.ihets.org/PDF/nortel1.pdf, Jan. 2000.
[10] Wind River, http://www.windriver.com/whitepapers/sip.pdf.
[11] M. Arango, et al., “Media Gateway Control Protocol (MGCP),” RFC 2705, http://www.ietf.org/rfc/rfc2705.txt?number=2705, Oct. 1999.
[12] SIP Center, http://www.sipcenter.com/sip.nsf/html/Protocol+Comparison.
[13] M. Handley and V. Jacobson, “SDP: Session Description Protocol,” RFC 2327, http://www.ietf.org/rfc/rfc2327.txt?number=2327, Apr. 1998.
[14] Kutscher, “Session Description and Capability Negotiation,” Internet Draft, http://www.ietf.org/internet-drafts/draft-ietf-mmusic-sdpng-07.txt, Oct. 2003.
[15] Telecommunications Industry Association, “Lawfully Authorized Electronic Surveillance for traditional voice telephony,” http://ftp.tiaonline.org/tr-45/ TR452/Incoming/LAES/J-STD-025A.pdf, Apr. 2000.
[16] International Packet Communication Consortium, “Lawfully Authorized Electronic Surveillance For Softwitch-based Networks,” http://www.soft switch.org, Jul. 2003.
[17] F. Baker, B. Foster, C. Sharp, “Cisco Architecture for Lawful Intercept in IP Networks,” Internet Draft, http://www.ietf.org/internet-drafts/draft-baker-slem -architecture-02.txt, Oct. 2003.
[18] ETSI ES 201 671 V2.1.1, “Telecommunication Security; Lawful Interception (LI); Handover interface for the lawful interception of telecommunication traffic,”http://webapp.etsi.org/exchangefolder/es_201671v020101p.pdf, Sep. 2001.
[19] ETSI TS 133 107 V5.6.0, “Universal Telecommunication System (UMTS); 3G Security; Lawful interception architecture and functions,” http://webapp.etsi.org/ exchangefolder/ts_133107v050600p.pdf, Sep. 2003.
[20] Tia Co, “CALEA Packet Surveillance JEM Final Report,” http://www. tiaonline.org/standards/CALEA_JEM, Aug. 20, 2000.
[21] N. Maloku, T. Aljaz, F. Dolenc, “Legal Call Interception in Next Generation Networks.”, Proceedings of the 7th International Conference on Telecommunications, Zagreb, Croatia, vol.1, Jun. 11-13, 2003.
[22] A. Milanovic, S. Srbljic, I. Raznjevic, D. Sladden, D. Skrobo, I. Matosevic, “Distributed System for Lawful Interception in VoIP Networks,” IEEE Computer as a Tool, vol.1, pp.203-207, Sep.22-24, 2003.
[23] A. Milanovic, S. Srbljic, I. Raznjevic, D. Sladden, D. Skrobo, I. Matosevic, “Methods for Lawful Interception in IP Telephony Networks Based on H.323,” IEEE Computer as a Tool, vol.1, pp.198-202, Sep.22-24, 2003.
[24] IP Telephony, http://www.iptel.org/ser/.
[25] H. Handley, et al., “RTP: A Transport Protocol for Real-Time Applications,” RFC 1889, http://www.ietf.org/rfc/rfc1889.txt?number=1889, Jan. 1996.
[26] ITU-T Recommendation G.114, “One way transmission delay,” Sep. 2002.
[27] Ubiquity, http://www.ubiquity.net/products/SIP/SIP_User_Agent.php. |