This paper discusses a mechanism to prevent unauthorized VoIP users from latching onto a service provider's access equipments. It offers a secured way of handling VoIP NAT/Traversal which could prove to be a much simpler alternative to other available techniques.
展开▼