A survey of SIP authentication and key agreement schemes
We present a survey of authentication and key agreement schemes that are proposed for the
SIP protocol. SIP has become the center piece for most VoIP architectures. Performance and …
SIP protocol. SIP has become the center piece for most VoIP architectures. Performance and …
A comprehensive survey of voice over IP security research
AD Keromytis - IEEE Communications Surveys & Tutorials, 2011 - ieeexplore.ieee.org
We present a comprehensive survey of Voice over IP security academic research, using a
set of 245 publications forming a closed cross-citation set. We classify these papers …
set of 245 publications forming a closed cross-citation set. We classify these papers …
Identity and content authentication for phone calls
H04L 9/32(2006.01) H04W 12/04(2009.01) H04L 29/06(2006.01) H04W 12/06(2009.01)
H04W 12/00(2009.01) H04W 12/10(2009.01)(52) US Ci.??? H04L 65/1076 (2013.01); …
H04W 12/00(2009.01) H04W 12/10(2009.01)(52) US Ci.??? H04L 65/1076 (2013.01); …
Design of an asterisk-based VoIP system and the implementation of security solution across the VoIP network
W Tuleun - World Journal of Advanced Research and Reviews, 2024 - wjarr.co.in
Voice over Internet Protocol (VoIP) is a rapidly advancing technology that facilitates the
transmission of voice and audio signals over the Internet or an IP-based network in real …
transmission of voice and audio signals over the Internet or an IP-based network in real …
Sok: Everyone hates robocalls: A survey of techniques against telephone spam
Telephone spam costs United States consumers $8.6 billion annually. In 2014, the Federal
Trade Commission has received over 22 million complaints of illegal and wanted calls …
Trade Commission has received over 22 million complaints of illegal and wanted calls …
[PDF][PDF] A new speech encryption algorithm based on dual shuffling Hénon chaotic map
OM Al-Hazaimeh - International Journal of Electrical and …, 2021 - researchgate.net
Over the past few decades, many algorithms have been proposed to improve the
performance of speech encryption over un-secure channel (ie, Internet). In this paper, the …
performance of speech encryption over un-secure channel (ie, Internet). In this paper, the …
VoIPChain: A decentralized identity authentication in Voice over IP using Blockchain
Abstract Confidentiality, availability, integrity, authentication, and non-repudiation when
together became the top priority for secure communication. However, authentication is the …
together became the top priority for secure communication. However, authentication is the …
[PDF][PDF] A new dynamic speech encryption algorithm based on Lorenz chaotic map over internet protocol
OM Al-Hazaimeh - International Journal of Electrical and Computer …, 2020 - academia.edu
This paper introduces a dynamic speech encryption algorithm based on Lorenz chaotic map
over internet protocol to enhance the services of the real-time applications such as …
over internet protocol to enhance the services of the real-time applications such as …
A novel approach for efficient mitigation against the SIP-based DRDoS attack
IM Tas, S Baktir - Applied Sciences, 2023 - mdpi.com
Voice over Internet Protocol (VoIP) and its underlying Session Initiation Protocol (SIP) are
widely deployed technologies since they provide an efficient and fast means of both voice …
widely deployed technologies since they provide an efficient and fast means of both voice …
A review of cyber threats and defence approaches in emergency management
Emergency planners, first responders and relief workers increasingly rely on computational
and communication systems that support all aspects of emergency management, from …
and communication systems that support all aspects of emergency management, from …