On the Cryptographic Features of a VoIP Service
Security issues of typical Voice over Internet Protocol (VoIP) applications are studied in this paper; in particular, the open source Linphone application is being used as a case study.
Dimitrios Alvanos +2 more
doaj +1 more source
SecMon: End-to-End Quality and Security Monitoring System [PDF]
The Voice over Internet Protocol (VoIP) is becoming a more available and popular way of communicating for Internet users. This also applies to Peer-to-Peer (P2P) systems and merging these two have already proven to be successful (e.g. Skype).
Ciszkowski, Tomasz +5 more
core +4 more sources
Voice over IP is quickly becoming the industry standard voice communication service. While using an IP-based method of communication has many advantages, it also comes with a new set of challenges; voice networks are now accessible to a multitude of ...
John Kafke, Thiago Viana
doaj +1 more source
VOIP for Telerehabilitation: A Risk Analysis for Privacy, Security and HIPAA Compliance: Part II
In a previous publication the authors developed a privacy and security checklist to evaluate Voice over the Internet Protocol (VoIP) videoconferencing software used between patients and therapists to provide telerehabilitation (TR) therapy. In this
Valerie J.M. Watzlaf +3 more
doaj +1 more source
Security of Streaming Media Communications with Logistic Map and Self-Adaptive Detection-Based Steganography [PDF]
Voice over IP (VoIP) is finding its way into several applications, but its security concerns still remain. This paper shows how a new self-adaptive steganographic method can ensure the security of covert VoIP communications over the Internet.
Jiang, Y, Meziane, F, Peng, J, Tang, S
core +3 more sources
Threshold-based generic scheme for encrypted and tunneled Voice Flows Detection over IP Networks
VoIP usage is rapidly growing due to its cost effectiveness, dramatic functionality over the traditional telephone network and its compatibility with public switched telephone network (PSTN). In some countries, like Pakistan, the commercial usage of VoIP
M. Mazhar U. Rathore
doaj +1 more source
New security and control protocol for VoIP based on steganography and digital watermarking [PDF]
In this paper new security and control protocol for Voice over Internet Protocol (VoIP) service is presented. It is the alternative for the IETF's (Internet Engineering Task Force) RTCP (Real-Time Control Protocol) for real-time application's traffic ...
Kotulski, Zbigniew, Mazurczyk, Wojciech
core +3 more sources
User Access Control and Authentication System for VoIP Service in Mobile Communication Environments
VoIP, which is used to transmit voice data on the Internet, is being welcomed as a replacement for the PSTN. In VoIP, voice data are converted to IP data and transmitted in an ordinary IP network.
Ho-Kyung Yang +3 more
doaj +1 more source
VoIP for Telerehabilitation: A Pilot Usability Study for HIPAA Compliance
Consumer-based, free Voice and video over the Internet Protocol (VoIP) software systems such as Skype and others are used by health care providers to deliver telerehabilitation and other health-related services to clients.
Valerie R. Watzlaf, Briana Ondich
doaj +1 more source
SecSip: A Stateful Firewall for SIP-based Networks [PDF]
SIP-based networks are becoming the de-facto standard for voice, video and instant messaging services. Being exposed to many threats while playing an major role in the operation of essential services, the need for dedicated security management approaches
Festor, Olivier, Lahmadi, Abdelkader
core +5 more sources

