Essays about: "Secure VoIP"

Showing result 1 - 5 of 16 essays containing the words Secure VoIP.

  1. 1. Homomorphic Encryption for Audio Conferencing

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Herman Nordin; Ebba Lindström; [2022]
    Keywords : Homomorphic encryption; VoIP; security; audio conferencing; cryptography;

    Abstract : Homomorphic encryption (HE) enables computations on encrypted data making it possible to perform calculations on a server without sharing the secret key for decryption. HE is relatively new and has seen significant improvements in recent years in terms of speed of encryption, decryption, operations, and the number of operations possible to perform in a row without damaging the ciphertext. READ MORE

  2. 2. Protocol-aware fuzzing of DTLS

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Rahbar Ghori; [2021]
    Keywords : ;

    Abstract : Communication protocols like TCP and UDP enable transfer of databetween sender and receiver during online communication. To provide security from eavesdropping, message forgery and data tampering during online communication, communication protocols likeTLS and DTLS are run on top of TCP/UDP. READ MORE

  3. 3. On the security of VoIP mobile network operator and international carrier interconnects

    University essay from KTH/Skolan för elektro- och systemteknik (EES)

    Author : Mina Naguib; [2016]
    Keywords : VoIP; Security; TDM; PSTN; International Carrier Network; Mobile Operators; SBC; Signaling;

    Abstract : All Mobile Network Operators (MNOs) as well as international carriers are moving voice services from the legacy Public Switched Telephone Network (PSTN) to Voice over IP (VoIP). The benefit is that VoIP traffic can be easily rerouted at any moment, thus giving companies a variety of options as traffic can be rerouted to any carrier of choice leading to different Quality of Service (QoS) levels (and thus agreements) as well as different prices to choose from. READ MORE

  4. 4. A reverse proxy for VoIP : Or how to improve security in a ToIP network

    University essay from KTH/Kommunikationsnät

    Author : Guillaume Dhainaut; [2016]
    Keywords : VoIP; ToIP; SIP; SIPS; RTP; SRTP; SBC; session border controller; security; toll fraud;

    Abstract : The need for security is crucial in Telephony over IP (ToIP). Secure protocols have been designed as well as specific devices to fulfill that need. This master thesis examines one of such devices called Session Border Controller (SBC), which can be compared to reverse proxies for ToIP. The idea is to apply message filters to increase security. READ MORE

  5. 5. Parametric Prediction Model for Perceived Voice Quality in Secure VoIP

    University essay from Linköpings universitet/Informationskodning

    Author : Martin Andersson; [2016]
    Keywords : VoIP; QoS; Parametric model; Encryption;

    Abstract : More and more sensitive information is communicated digitally and with thatcomes the demand for security and privacy on the services being used. An accurateQoS metric for these services are of interest both for the customer and theservice provider. READ MORE