[1]
“VOIP End-To-End Security using S/MIME and a Security Toolbox”, GJCST, vol. 14, no. E2, pp. 53–56, Jan. 2014, Accessed: Feb. 04, 2026. [Online]. Available: https://testing.computerresearch.org/index.php/computer/article/view/83