Security in VoIP (original) (raw)
Related papers
Multimedia Tools and Applications, 2020
VoIP Speech Encryption System Using Stream Cipher with Chaotic Key Generator
Iraqi journal of science, 2021
Biometric Cryptosystem for VoIP Security using RSA Key Generation
2014
Encrypted Fingerprint into VoIP Systems using Cryptographic Key Generated by Minutiae Points
International Journal of Advanced Computer Science and Applications, 2018
A Novel End-to-End VoIP Security using Encrypted Biometrics Cryptographic Signatures
Securing Modern Voice Communication Systems using Multilevel Chaotic Approach
International Journal of Computer Applications, 2016
A new dynamic speech encryption algorithm based on Lorenz chaotic map over internet protocol
International Journal of Electrical and Computer Engineering (IJECE)
International Journal of Electrical and Computer Engineering (IJECE), 2020
Cryptanalysis of a data security protection scheme for VoIP
IEE Proceedings - Vision, Image, and Signal Processing, 2006
06 Cryptanalysis of a data security protection scheme for VoIP.pdf
Securing digital voice communication using non-autonomous modulated chaotic signal
Journal of Information Security and Applications, 2017
Chaos-Based Cryptography for Voice Secure Wireless Communication
Multidisciplinary Perspectives in Cryptology and Information Security, 2014
International Journal of Security and Networks, 2022
A Speech Cryptosystem Based on Chaotic Modulation Technique
The Egyptian Journal of Language Engineering, 2017
FPGA-based Chaotic Cryptosystem by Using Voice Recognition as Access Key
Electronics
Design of Secure VoIP using ID-Based Cryptosystem
13Th International Conference on Advanced Communication Technology, 2011
Analysis of Speech Cryptography Based on Segmentation and Chaotic Logistic Map Keys
International Journal of Computer Science and Mobile Computing
Chaos Based Mixed Keystream Generation for Voice Data Encryption
International Journal on Cryptography and Information Security, 2012
New Cryptographic Algorithms for Enhancing Security of Voice Data
2010
A Review on Noisy Password, Voiceprint Biometric and One-Time-Password
Proposed Random Unified Chaotic Map as PRBG for Voice Encryption in Wireless Communication
Procedia Computer Science, 2015
2006
Secure speech communication system based on scrambling and masking by chaotic maps
2018 International Conference on Advance of Sustainable Engineering and its Application (ICASEA)
IJERT-Strengthen Fingerprint Data Security Using Chaotic Map Approach
International Journal of Engineering Research and Technology (IJERT), 2013
Chaotic-Based Encryption Algorithm using Henon and Logistic Maps for Fingerprint Template Protection
2020
Simple and Efficient Chaotic Based Method of Message Cryptography
International Journal of Computer Science and Mobile Computing
Voice Security Using Hybrid Algorithm
AL-Rafidain Journal of Computer Sciences and Mathematics, 2010
Critical voice network security analysis and new approach for securing Voice over IP Communications
2005
Comparative analysis on Security Techniques in VoIP Environment
A novel chaotic encryption technique for secure communication
Second IFAC Conference on Analysis and Control of Chaotic Systems (2009), 2009