Bilien, 2003 - Google Patents
Key Agreement for secure Voice over IPBilien, 2003
View PDF- Document ID
- 7029118762411329240
- Author
- Bilien J
- Publication year
External Links
Snippet
Key Agreement for Secure Voice over IP Page 1 Master of Science Thesis Stockholm,
Sweden 2003 IMIT/LCN 2003-14 JOHAN BILIEN Key Agreement for Secure Voice over IP
Page 2 Key Agreement for Secure Voice over IP Master of Science Thesis December 2003 …
- 238000005516 engineering process 0 abstract description 6
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L29/00—Arrangements, apparatus, circuits or systems, not covered by a single one of groups H04L1/00 - H04L27/00 contains provisionally no documents
- H04L29/02—Communication control; Communication processing contains provisionally no documents
- H04L29/06—Communication control; Communication processing contains provisionally no documents characterised by a protocol
- H04L29/0602—Protocols characterised by their application
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
- H04M3/56—Arrangements for connecting several subscribers to a common circuit, i.e. affording conference facilities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L29/00—Arrangements, apparatus, circuits or systems, not covered by a single one of groups H04L1/00 - H04L27/00 contains provisionally no documents
- H04L29/12—Arrangements, apparatus, circuits or systems, not covered by a single one of groups H04L1/00 - H04L27/00 contains provisionally no documents characterised by the data terminal contains provisionally no documents
- H04L29/12009—Arrangements for addressing and naming in data networks
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Gupta et al. | Security analysis of voice-over-IP protocols | |
| WO2003049357A2 (en) | Lawful interception of end-to-end encrypted data traffic | |
| Wang et al. | A dependable privacy protection for end-to-end VoIP via Elliptic-Curve Diffie-Hellman and dynamic key changes | |
| Karopoulos et al. | PrivaSIP: Ad-hoc identity privacy in SIP | |
| Hsieh et al. | Implementing a secure VoIP communication over SIP-based networks | |
| Karopoulos et al. | A framework for identity privacy in SIP | |
| Palmieri et al. | Providing true end-to-end security in converged voice over IP infrastructures | |
| WO2017197968A1 (en) | Data transmission method and device | |
| Wing et al. | Requirements and analysis of media security management protocols | |
| Bilien | Key Agreement for secure Voice over IP | |
| Subashri et al. | Real time implementation of Elliptic Curve Cryptography over a open source VoIP server | |
| Bou Diab et al. | Critical vpn security analysis and new approach for securing voip communications over vpn networks | |
| Thalhammer | Security inVoIP-Telephony Systems | |
| Nakarmi | Evaluation of VoIP Security for Mobile Devices | |
| Yeun et al. | Practical implementations for securing voip enabled mobile devices | |
| Floroiu et al. | A comparative analysis of the security aspects of the multimedia key exchange protocols | |
| Naveed Asghar et al. | Key management protocols for secure wireless multimedia services: a review | |
| Karopoulos et al. | Caller identity privacy in SIP heterogeneous realms: A practical solution | |
| Eliasson | Secure Internet telephony: design, implementation and performance measurements | |
| Gurbani et al. | A secure and lightweight scheme for media keying in the session initiation protocol (SIP) work in progress | |
| Bassil et al. | Critical analysis and new perspective for securing Voice Networks | |
| Deusajute et al. | The sip security enhanced by using pairing-assisted massey-omura signcryption | |
| Singhai et al. | VoIP Security | |
| Heikkinen | Establishing a secure peer identity association using IMS architecture | |
| Hasib et al. | Towards public key infrastructure less authentication in session initiation protocol |