Main Article Content
Submission of an original manuscript to the journal will be taken to mean that it represents originality work not previously published. Please see JIEET (Journal of Information Engineering and Educational Technology) originality guidelines for details. Use this in conjunction with the points below about references, before submission i.e. always attribute clearly using either indented text or quote marks as well as making use of the preferred IEEE style of formatting. Authors submitting articles for publication warrant that the work is not an infringement of any existing copyright and will indemnify the publisher against any breach of such warranty. For ease of dissemination and to ensure proper policing of use, papers and contributions become the legal copyright of the publisher unless otherwise agreed.
The editor may make use of Thurnitin software for checking the originality of submissions received.
 Barbieri. R, Bruschi.D, and Rosti. E. 2002. Voice over IPsec: Analysis and Solutions. In Proceedingsof the 18th Annual Computer Security Applications Conference (ACSAC), pages 261270, December.
 Eren, Evren. Detken, Kai-Oliver. œVoice-over-IP Security Mechanisms State_of:
 Fatkhurrokhman, M. 2013. Analisis Perbandingan Metode Routing Link State Vs Distance Vector
 Guillen, EP. Chacon, DA. 2009. VoIP Networks Performance Analysis with Encryption Systems. World Academy of Science, Engineering and Technology. 58
 Ismail, MN. 2009. Analyzing of MOS and Codec Selection for Voice over IP Technology. Anale. Seria Informatica. Vol. VII fasc. january.
 Jelassi, S. Rubino, G. Melvin, H. Youssef, H. Pujolle, G. 2012. Quality of experience of VoIP service: a survey of assessment approaches and open issues, IEEE Commun. Surveys Tutorials 14 (2) 491513.
 Latubessy, A. Indrastanti R. Widiasari, Rissal Efendi. 2013. Analisis delay voice over internet protocol pada wide area network menggunakan single area open shortest path first routing protocol.
 Roberts. C. 2005 œVoice Over IP Security. Centre for Critical Infrastructure Protection. New Zealand.
 Rosenberg, J. Schulzrinne, H. Camarillo, G. Johnston, A. Peterson, J. Sparks, R. Handley, M. and Schooler. E. 2002. SIP: Session Initiation Protocol. IETF RFC 3261, June.
 Schulzrinne, H., Casner, S., Frederick R., Jacobson, V. 2003. œRTP: ATransport Protocol for Real-Time Applications. IETF RFC 3550. July.
 Thermos, P. A. Takanen. 2007. œSecuring VoIP networks, Threats, Vulnerabilities, and Countermeasures. Addison Wesley. August.
 Wang, L. P. K. Verma, A Network Based Authentication Scheme for VoIP, School of Electrical and Computer Engineering University of