Essays about: "Secure VoIP"
Showing result 1 - 5 of 16 essays containing the words Secure VoIP.
-
1. Homomorphic Encryption for Audio Conferencing
University essay from Linköpings universitet/Institutionen för datavetenskapAbstract : Homomorphic encryption (HE) enables computations on encrypted data making it possible to perform calculations on a server without sharing the secret key for decryption. HE is relatively new and has seen significant improvements in recent years in terms of speed of encryption, decryption, operations, and the number of operations possible to perform in a row without damaging the ciphertext. READ MORE
-
2. Protocol-aware fuzzing of DTLS
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : Communication protocols like TCP and UDP enable transfer of databetween sender and receiver during online communication. To provide security from eavesdropping, message forgery and data tampering during online communication, communication protocols likeTLS and DTLS are run on top of TCP/UDP. READ MORE
-
3. On the security of VoIP mobile network operator and international carrier interconnects
University essay from KTH/Skolan för elektro- och systemteknik (EES)Abstract : All Mobile Network Operators (MNOs) as well as international carriers are moving voice services from the legacy Public Switched Telephone Network (PSTN) to Voice over IP (VoIP). The benefit is that VoIP traffic can be easily rerouted at any moment, thus giving companies a variety of options as traffic can be rerouted to any carrier of choice leading to different Quality of Service (QoS) levels (and thus agreements) as well as different prices to choose from. READ MORE
-
4. A reverse proxy for VoIP : Or how to improve security in a ToIP network
University essay from KTH/KommunikationsnätAbstract : The need for security is crucial in Telephony over IP (ToIP). Secure protocols have been designed as well as specific devices to fulfill that need. This master thesis examines one of such devices called Session Border Controller (SBC), which can be compared to reverse proxies for ToIP. The idea is to apply message filters to increase security. READ MORE
-
5. Parametric Prediction Model for Perceived Voice Quality in Secure VoIP
University essay from Linköpings universitet/InformationskodningAbstract : More and more sensitive information is communicated digitally and with thatcomes the demand for security and privacy on the services being used. An accurateQoS metric for these services are of interest both for the customer and theservice provider. READ MORE