Results 1 to 10 of about 4,910 (97)
Closed-Circuit Unobservable Voice over IP [PDF]
Among all the security issues in Voice over IP (VoIP) communications, one of the most difficult to achieve is traffic analysis resistance. Indeed, classical approaches provide a reasonable degree of security but induce large round-trip times that are incompatible with VoIP. In this paper, we describe some of the privacy and security issues derived from
Aguilar Melchor, Carlos +2 more
openaire +2 more sources
The implications of ambimorphic archetypes have been far-reaching and pervasive. After years of natural research into consistent hashing, we argue the simulation of public-private key pairs, which embodies the confirmed principles of theory. Such a hypothesis might seem perverse but is derived from known results.
Anggi Cecilia Safaningrum +2 more
openaire +2 more sources
Ο σκοπός της παρούσας διατριβής είναι διττός. Από τη μία πλευρά γίνεται διερεύνηση των δυνατοτήτων ανάκτησης ψηφιακών πειστηρίων (forensics) που υπάρχουν σε επικοινωνίες μετάδοσης φωνής πάνω από το διαδίκτυο (VoIP). Από την άλλη πλευρά διερευνάται η χρήση τεχνικών απόκρυψης (anti-forensics) σε ένα ετερογενές δίκτυο επικοινωνιών.Οι δύο αυτοί φαινομενικά
openaire +1 more source
IP over Voice-over-IP for censorship circumvention
Open communication over the Internet poses a serious threat to countries with repressive regimes, leading them to develop and deploy network-based censorship mechanisms within their networks. Existing censorship circumvention systems face different difficulties in providing unobservable communication with their clients; this limits their availability ...
Houmansadr, Amir +3 more
openaire +2 more sources
Steganography and Steganalysis in Voice over IP: A Review. [PDF]
Wu Z, Guo J, Zhang C, Li C.
europepmc +1 more source
The Voice over IP (VoIP) technology has become prevalent today due to its lower cost than traditional telephony and its ability to support new value-added services. Additionally, the increasing availability of wireless internet access has led to research studies examining the combination of wireless network access with voice over IP.
openaire +1 more source
Srividhya S.R, Anita Davamani K
openaire +3 more sources
Characterizing the safety and efficacy of injection pharyngoplasty as a treatment for velopharyngeal insufficiency in adults. [PDF]
Kalra A +5 more
europepmc +1 more source
The WeDDa framework for preventing smishing and vishing using protocol agnostic cryptographic trust. [PDF]
Salem MFM, Hamad EKI, El-Bendary MAM.
europepmc +1 more source
Agreeing to disagree: When do superordinate identities facilitate competing opinion-based groups to work through intergroup conflict? [PDF]
Haines EA, Thomas EF, Wenzel M.
europepmc +1 more source

