Sciweavers

265 search results - page 6 / 53
» Security Patterns for Voice over IP Networks
Sort
View
ICMCS
2005
IEEE
101views Multimedia» more  ICMCS 2005»
14 years 1 months ago
Speech-adaptive layered G.729 coder for loss concealments of real-time voice over IP
In this paper, we propose a speech-adaptive layered-coding (LC) scheme for the loss concealments of real-time CELPcoded speech transmitted over IP networks. Based on the ITU G.729...
Batu Sat, Benjamin W. Wah
CSREASAM
2006
13 years 9 months ago
Efficient and Secure Authentication Protocols for Mobile VoIP Communications
Mobile Voice over IP (Mobile VoIP) allows mobile users to continuously talk with each others while roaming across different networks. In such wireless application, it is vulnerabl...
Huang-Ju Chen, Jyh-Ming Huang, Lei Wang
IJNSEC
2007
253views more  IJNSEC 2007»
13 years 7 months ago
Stream or Block Cipher for Securing VoIP?
When the network is homogeneous, choosing the cipher type for a packet telephony application is simple. It is clear that stream ciphers perform better than block ciphers over land...
Ashraf D. Elbayoumy, Simon J. Shepherd
LCN
2007
IEEE
14 years 2 months ago
Voice quality measurement in a typical router-based network
In this paper, we introduce novel mechanisms for measuring and evaluating the performance of a network and its devices, configured especially for Voice over IP (VoIP). We study the...
A. Azarfar, A. H. Jahangir
TELSYS
2010
154views more  TELSYS 2010»
13 years 2 months ago
Blocking attacks on SIP VoIP proxies caused by external processing
As Voice over IP (VoIP) applications become increasingly popular, they are more and more facing security challenges that have not been present in the traditional Public Switched Te...
Ge Zhang, Simone Fischer-Hübner, Sven Ehlert