Essays about: "Security of VOIP"
Showing result 1 - 5 of 26 essays containing the words Security of VOIP.
-
1. SIPman : A penetration testing methodology for SIP and RTP
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background. SIP and RTP are two protocols that are widely used, and they play an important role in VoIP services. VoIP is an integral part of many communication services, e.g. READ MORE
-
2. Homomorphic Encryption for Audio Conferencing
University essay from Linköpings universitet/Institutionen för datavetenskapAbstract : Homomorphic encryption (HE) enables computations on encrypted data making it possible to perform calculations on a server without sharing the secret key for decryption. HE is relatively new and has seen significant improvements in recent years in terms of speed of encryption, decryption, operations, and the number of operations possible to perform in a row without damaging the ciphertext. READ MORE
-
3. Protocol-aware fuzzing of DTLS
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : Communication protocols like TCP and UDP enable transfer of databetween sender and receiver during online communication. To provide security from eavesdropping, message forgery and data tampering during online communication, communication protocols likeTLS and DTLS are run on top of TCP/UDP. READ MORE
-
4. On the security of VoIP mobile network operator and international carrier interconnects
University essay from KTH/Skolan för elektro- och systemteknik (EES)Abstract : All Mobile Network Operators (MNOs) as well as international carriers are moving voice services from the legacy Public Switched Telephone Network (PSTN) to Voice over IP (VoIP). The benefit is that VoIP traffic can be easily rerouted at any moment, thus giving companies a variety of options as traffic can be rerouted to any carrier of choice leading to different Quality of Service (QoS) levels (and thus agreements) as well as different prices to choose from. READ MORE
-
5. A reverse proxy for VoIP : Or how to improve security in a ToIP network
University essay from KTH/KommunikationsnätAbstract : The need for security is crucial in Telephony over IP (ToIP). Secure protocols have been designed as well as specific devices to fulfill that need. This master thesis examines one of such devices called Session Border Controller (SBC), which can be compared to reverse proxies for ToIP. The idea is to apply message filters to increase security. READ MORE