Results 11 to 20 of about 21,969 (207)

On the Cryptographic Features of a VoIP Service

open access: yesCryptography, 2018
Security issues of typical Voice over Internet Protocol (VoIP) applications are studied in this paper; in particular, the open source Linphone application is being used as a case study.
Dimitrios Alvanos   +2 more
doaj   +1 more source

SecMon: End-to-End Quality and Security Monitoring System [PDF]

open access: yes, 2008
The Voice over Internet Protocol (VoIP) is becoming a more available and popular way of communicating for Internet users. This also applies to Peer-to-Peer (P2P) systems and merging these two have already proven to be successful (e.g. Skype).
Ciszkowski, Tomasz   +5 more
core   +4 more sources

Call Me Maybe: Using Dynamic Protocol Switching to Mitigate Denial-of-Service Attacks on VoIP Systems

open access: yesNetwork, 2022
Voice over IP is quickly becoming the industry standard voice communication service. While using an IP-based method of communication has many advantages, it also comes with a new set of challenges; voice networks are now accessible to a multitude of ...
John Kafke, Thiago Viana
doaj   +1 more source

VOIP for Telerehabilitation: A Risk Analysis for Privacy, Security and HIPAA Compliance: Part II

open access: yesInternational Journal of Telerehabilitation, 2011
In a previous publication the authors developed a privacy and security checklist to evaluate Voice over the Internet Protocol (VoIP) videoconferencing software used between patients and therapists to provide telerehabilitation (TR) therapy.  In this
Valerie J.M. Watzlaf   +3 more
doaj   +1 more source

Security of Streaming Media Communications with Logistic Map and Self-Adaptive Detection-Based Steganography [PDF]

open access: yes, 2019
Voice over IP (VoIP) is finding its way into several applications, but its security concerns still remain. This paper shows how a new self-adaptive steganographic method can ensure the security of covert VoIP communications over the Internet.
Jiang, Y, Meziane, F, Peng, J, Tang, S
core   +3 more sources

Threshold-based generic scheme for encrypted and tunneled Voice Flows Detection over IP Networks

open access: yesJournal of King Saud University: Computer and Information Sciences, 2015
VoIP usage is rapidly growing due to its cost effectiveness, dramatic functionality over the traditional telephone network and its compatibility with public switched telephone network (PSTN). In some countries, like Pakistan, the commercial usage of VoIP
M. Mazhar U. Rathore
doaj   +1 more source

New security and control protocol for VoIP based on steganography and digital watermarking [PDF]

open access: yes, 2006
In this paper new security and control protocol for Voice over Internet Protocol (VoIP) service is presented. It is the alternative for the IETF's (Internet Engineering Task Force) RTCP (Real-Time Control Protocol) for real-time application's traffic ...
Kotulski, Zbigniew, Mazurczyk, Wojciech
core   +3 more sources

User Access Control and Authentication System for VoIP Service in Mobile Communication Environments

open access: yesInternational Journal of Distributed Sensor Networks, 2014
VoIP, which is used to transmit voice data on the Internet, is being welcomed as a replacement for the PSTN. In VoIP, voice data are converted to IP data and transmitted in an ordinary IP network.
Ho-Kyung Yang   +3 more
doaj   +1 more source

VoIP for Telerehabilitation: A Pilot Usability Study for HIPAA Compliance

open access: yesInternational Journal of Telerehabilitation, 2012
Consumer-based, free Voice and video over the Internet Protocol (VoIP) software systems such as Skype and others are used by health care providers to deliver telerehabilitation and other health-related services to clients.
Valerie R. Watzlaf, Briana Ondich
doaj   +1 more source

SecSip: A Stateful Firewall for SIP-based Networks [PDF]

open access: yes, 2009
SIP-based networks are becoming the de-facto standard for voice, video and instant messaging services. Being exposed to many threats while playing an major role in the operation of essential services, the need for dedicated security management approaches
Festor, Olivier, Lahmadi, Abdelkader
core   +5 more sources

Home - About - Disclaimer - Privacy