Comparative analysis on security techniques in VoIP environment | IEEE Conference Publication | IEEE Xplore