Security in VoIP (original) (raw)

Voice over internet protocol voicemail security system using two factor authentication and biometric prints with new efficient hybrid cryptosystem

Hesham F A Hamed

Multimedia Tools and Applications, 2020

View PDFchevron_right

VoIP Speech Encryption System Using Stream Cipher with Chaotic Key Generator

Mahmood Ibrahem

Iraqi journal of science, 2021

View PDFchevron_right

Biometric Cryptosystem for VoIP Security using RSA Key Generation

Sridevi .R

2014

View PDFchevron_right

Encrypted Fingerprint into VoIP Systems using Cryptographic Key Generated by Minutiae Points

Anwer Mustafa

International Journal of Advanced Computer Science and Applications, 2018

View PDFchevron_right

A Novel End-to-End VoIP Security using Encrypted Biometrics Cryptographic Signatures

Innocent U Onwuegbuzie

View PDFchevron_right

Securing Modern Voice Communication Systems using Multilevel Chaotic Approach

mahmoud fawzy

International Journal of Computer Applications, 2016

View PDFchevron_right

A new dynamic speech encryption algorithm based on Lorenz chaotic map over internet protocol

International Journal of Electrical and Computer Engineering (IJECE)

International Journal of Electrical and Computer Engineering (IJECE), 2020

View PDFchevron_right

Cryptanalysis of a data security protection scheme for VoIP

Shujun Li

IEE Proceedings - Vision, Image, and Signal Processing, 2006

View PDFchevron_right

06 Cryptanalysis of a data security protection scheme for VoIP.pdf

Cary Li

View PDFchevron_right

Securing digital voice communication using non-autonomous modulated chaotic signal

mahmoud fawzy

Journal of Information Security and Applications, 2017

View PDFchevron_right

Chaos-Based Cryptography for Voice Secure Wireless Communication

rana saad

Multidisciplinary Perspectives in Cryptology and Information Security, 2014

View PDFchevron_right

Chebyshev chaotic map-based efficient authentication scheme for secure access of VoIP services through SIP

Vinod Mahor

International Journal of Security and Networks, 2022

View PDFchevron_right

A Speech Cryptosystem Based on Chaotic Modulation Technique

Mahmoud Fawzy

The Egyptian Journal of Language Engineering, 2017

View PDFchevron_right

FPGA-based Chaotic Cryptosystem by Using Voice Recognition as Access Key

Abraham Flores Vergara

Electronics

View PDFchevron_right

Design of Secure VoIP using ID-Based Cryptosystem

Kyusuk Han

View PDFchevron_right

An investigation into the effect of security on reliability and voice recognition system in a VoIP network

ohnmar nhway

13Th International Conference on Advanced Communication Technology, 2011

View PDFchevron_right

Analysis of Speech Cryptography Based on Segmentation and Chaotic Logistic Map Keys

Ziad Alqadi

International Journal of Computer Science and Mobile Computing

View PDFchevron_right

Chaos Based Mixed Keystream Generation for Voice Data Encryption

Omar Farooq

International Journal on Cryptography and Information Security, 2012

View PDFchevron_right

New Cryptographic Algorithms for Enhancing Security of Voice Data

Obaida M . Al-hazaimeh

2010

View PDFchevron_right

A Review on Noisy Password, Voiceprint Biometric and One-Time-Password

Najmi Azam

View PDFchevron_right

Proposed Random Unified Chaotic Map as PRBG for Voice Encryption in Wireless Communication

rana saad

Procedia Computer Science, 2015

View PDFchevron_right

Voice interactive personalized security (VoIPSec) protocol: fortify internet telephony by providing end-to-end security through inbound key exchange and biometric verification

George Athanasiou

2006

View PDFchevron_right

Secure speech communication system based on scrambling and masking by chaotic maps

Hikmat Abdullah

2018 International Conference on Advance of Sustainable Engineering and its Application (ICASEA)

View PDFchevron_right

IJERT-Strengthen Fingerprint Data Security Using Chaotic Map Approach

IJERT Journal

International Journal of Engineering Research and Technology (IJERT), 2013

View PDFchevron_right

A study on VoIP Security

Imran Arif

View PDFchevron_right

Chaotic-Based Encryption Algorithm using Henon and Logistic Maps for Fingerprint Template Protection

Apri Siswanto

2020

View PDFchevron_right

Simple and Efficient Chaotic Based Method of Message Cryptography

Ziad Alqadi

International Journal of Computer Science and Mobile Computing

View PDFchevron_right

Voice Security Using Hybrid Algorithm

alyaa haleem

AL-Rafidain Journal of Computer Sciences and Mathematics, 2010

View PDFchevron_right

Critical voice network security analysis and new approach for securing Voice over IP Communications

Carole Bassil

2005

View PDFchevron_right

Comparative analysis on Security Techniques in VoIP Environment

Manish Tembhurkar

View PDFchevron_right

A novel chaotic encryption technique for secure communication

Zabih Ghassemlooy

Second IFAC Conference on Analysis and Control of Chaotic Systems (2009), 2009

View PDFchevron_right