<--- Back to Details
First PageDocument Content
Security Target / Common Criteria / Evaluation Assurance Level / Ohta / Protection Profile / Computer security / Voice over IP
Date: 2015-07-03 04:33:40
Security Target
Common Criteria
Evaluation Assurance Level
Ohta
Protection Profile
Computer security
Voice over IP

OPERATOR TERMINAL ADAPTER SECURITY TARGET Edition: May-15 Previous editions:

Add to Reading List

Source URL: sertit.no

Download Document from Source Website

File Size: 1.011,87 KB

Share Document on Facebook

Similar Documents

Hosted Voice Over IP Phone VVX 600 • • •

DocID: 1vgB1 - View Document

Data Sheet Cisco SPA112 2 Port Phone Adapter Affordable and Feature-Rich Voice over IP (VoIP) Highlights Eliminate compromise on voice quality or features for phone and fax capabilities associated with Internet voice

DocID: 1uJYr - View Document

Uncovering Spoken Phrases in Encrypted Voice over IP Conversations CHARLES V. WRIGHT MIT Lincoln Laboratory LUCAS BALLARD Google Inc.

DocID: 1urk5 - View Document

Chelmsford Amateur Radio Society Introduction to EchoLink EchoLink is a popular and flexible system that links analogue FM gateways (aka nodes) or repeaters via the internet using Voice over IP (VoIP). It can be used by

DocID: 1u2dk - View Document

ITU Radio Regulations / Amateur radio / EchoLink / Dual-tone multi-frequency signaling / Radio / International Telecommunication Union

EchoLink® What is EchoLink ? EchoLink allows you to communicate with other amateur radio stations over the internet, using VoIP (voice-over-IP) technology. The EchoLink software program allows worldwide connections to b

DocID: 1tVLL - View Document