Sciweavers

265 search results - page 8 / 53
» Security Patterns for Voice over IP Networks
Sort
View
WCNC
2008
IEEE
14 years 2 months ago
An End-to-End Measurement-Based Admission Control Policy for VoIP over Wireless Networks
—in this paper, we present a new policy for admitting Voice over IP (VoIP) sessions over wireless networks. Our proposed policy receives the admission information advertised by t...
Ala F. Khalifeh
CORR
2006
Springer
115views Education» more  CORR 2006»
13 years 7 months ago
New security and control protocol for VoIP based on steganography and digital watermarking
In this paper new, lightweight security and control protocol for Voice over Internet Protocol (VoIP) service is presented. It is the alternative for the IETF's (Internet Engi...
Wojciech Mazurczyk, Zbigniew Kotulski
IJNSEC
2007
128views more  IJNSEC 2007»
13 years 7 months ago
A Comprehensive Secure VoIP Solution
VoIP represents the future of digital voice communications and many carriers are preparing for the VoIP revolution. However, a number of outstanding issues need to be settled. The...
Ashraf D. Elbayoumy, Simon J. Shepherd
ISCN
2006
IEEE
14 years 1 months ago
VoIP performance in multi-layered satellite IP networks with on-board processing capability
— In this study, Voice over IP (VoIP) performance in multi-layered satellite IP networks with on-board processing (OBP) capability is investigated. With on-board processing, a sa...
Suzan Bayhan, Gürkan Gür, Fatih Alag&oum...
WETICE
2007
IEEE
14 years 2 months ago
Network Forensic on Encrypted Peer-to-Peer VoIP Traffics and the Detection, Blocking, and Prioritization of Skype Traffics
Skype is a popular peer-to-peer (P2P) voice over IP (VoIP) application evolving quickly since its launch in 2003. However, the ability to traverse network address translation (NAT...
Chun-Ming Leung, Yuen-Yan Chan