Real-Time End-To-End Secure Voice Communications Over GSM Voice Channel (original) (raw)
Related papers
Secure Data and Voice Transmission over GSM Voice Channel: Applications for Secure Communications
Secure Voice Communication via GSM Network
Data transmission via GSM voice channel for end to end security
2015 IEEE 5th International Conference on Consumer Electronics - Berlin (ICCE-Berlin), 2015
Secured Voice Communication via GSM Network
Development of a Cryptographic Dongle for Secure Voice Encryption over GSM Voice Channel
J. Inform. and Commun. Convergence Engineering, 2009
Secure end-to-end communication over GSM and PSTN networks
2009
EEE-GSM: End-to-End Encryption Scheme over GSM System
International Journal of Security and Its Applications, 2016
Algorithmic Approach to Encrypted Modes of Transmission of Real Time Media in a VOIP Architecture
2018
End to End Encryption Architecture for Voice over Internet Protocol
International Journal of Computer Applications, 2012
HD voice modem for end to end secure call
IRJET-Implementing Encryption Algorithm for Addressing GSM Security Issues
Secure End-to-End SMS Communication over GSM Networks
Enhanced the security of GSM (Global system for mobile)
2007
Enhancing the Security for End to End SMS in GSM or UMTS Networks
Proposed Terminal Device for End-to-End Secure SMS in Cellular Networks
10th Annual Symposium on Information Assurance (ASIA), 2015
International Journal of Computer Applications, 2020
Securing Communications ommunications onon VOIP VOIP
2013
On the Cryptographic Features of a VoIP Service
Cryptography, 2018
Implementation of Cryptographic Algorithms for GSM Cellular Standard
A Low Cost and Open-Source Solution for End-To-End Secure Calls Over Volte
2015
Secure Messaging System over GSM Based on Third Party Support
Contribution to Securing Communications ommunications on VOIP
2013
IJIRST - International Journal for Innovative Research in Science and Technology
Providing Secure Communication Services on the Public Telephone Network Infrastructures
… of the 10th International Conference on …, 2002
Journal of Computer Science IJCSIS
Two Level Security Implementation for Voice Data Transmission
Data and Voice Signal Intelligence Interception Over The GSM Um Interface
VoIP Security: Improving Quality of Service through the Analysis of Secured Transmission
An Overview of Real Time Secure SMS Transmission
Implimentation of Cryptographic Algorithm for GSM and UMTS Systems
International Journal of Network Security & Its Applications, 2011