Essays about: "thesis on voip security"

Showing result 1 - 5 of 15 essays containing the words thesis on voip security.

  1. 1. Homomorphic Encryption for Audio Conferencing

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Herman Nordin; Ebba Lindström; [2022]
    Keywords : Homomorphic encryption; VoIP; security; audio conferencing; cryptography;

    Abstract : Homomorphic encryption (HE) enables computations on encrypted data making it possible to perform calculations on a server without sharing the secret key for decryption. HE is relatively new and has seen significant improvements in recent years in terms of speed of encryption, decryption, operations, and the number of operations possible to perform in a row without damaging the ciphertext. READ MORE

  2. 2. A reverse proxy for VoIP : Or how to improve security in a ToIP network

    University essay from KTH/Kommunikationsnät

    Author : Guillaume Dhainaut; [2016]
    Keywords : VoIP; ToIP; SIP; SIPS; RTP; SRTP; SBC; session border controller; security; toll fraud;

    Abstract : The need for security is crucial in Telephony over IP (ToIP). Secure protocols have been designed as well as specific devices to fulfill that need. This master thesis examines one of such devices called Session Border Controller (SBC), which can be compared to reverse proxies for ToIP. The idea is to apply message filters to increase security. READ MORE

  3. 3. Parametric Prediction Model for Perceived Voice Quality in Secure VoIP

    University essay from Linköpings universitet/Informationskodning

    Author : Martin Andersson; [2016]
    Keywords : VoIP; QoS; Parametric model; Encryption;

    Abstract : More and more sensitive information is communicated digitally and with thatcomes the demand for security and privacy on the services being used. An accurateQoS metric for these services are of interest both for the customer and theservice provider. READ MORE

  4. 4. Secure key management in a trusted domain on mobile devices

    University essay from Linköpings universitet/Databas och informationsteknik; Linköpings universitet/Tekniska fakulteten

    Author : Oskar Solsjö; [2015]
    Keywords : TPM; TEE; Common Criteria; Evaluation;

    Abstract : As mobile devices manage more and more sensitive information they have become a more targeted platform to exploit. To maintain system integrity while providing a highly responsive product, platform developers have developed hardware as well as software solutions to improve security. READ MORE

  5. 5. SIP Security Threats and Countermeasures

    University essay from Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE)

    Author : Faisal Mahmood; [2012]
    Keywords : Security of SIP;

    Abstract : With the emergence of multimedia applications and the upcoming age of Voice over IP (VoIP), Voice setup and resources control protocols such as SIP and H.323 over the Internet are becoming increasingly attractive applications. READ MORE