Security evaluation of VoIP cryptographic algorithms

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Comparative Evaluation of Cryptographic Algorithms

Security of information has become an important issue in data communication. Encryption has come up as a solution, and plays a vital role in information security system. This security mechanism uses some algorithms to scramble data into unreadable text which can be only being decoded or decrypted by party those possesses the associated key. These algorithms consume a significant amount of compu...

متن کامل

Recommendations for Hardware Evaluation of Cryptographic Algorithms

At the SASC 2006 three papers on hardware implementation of the eSTREAM candidates were presented. The workshop provided an interesting platform where hardware designers were confronted with the developers of the algorithms. The presentations were followed by a lively discussion. As hardware designers, we must admit that we have learned a lot from these discussions. In this brief document we wa...

متن کامل

Security of VoIP

Voice over IP (VoIP) is gaining more popularity in today's communications. The Session Initiation Protocol (SIP) is becoming one of the dominant VoIP signalling protocol[1, 2], however it is vulnerable to many kinds of attacks. Among these attacks, flood-based denial of service attacks have been identified as the major threat to SIP. Even though a great deal of research has been carried out to ...

متن کامل

Towards Quantitative Metrics for Evaluation of VoIP Security Systems

VoIP systems is the new voice communication technology and is playing a key role in various sectors (Government, business, education etc) for the development of a country. Unfortunately, industry and academic researchers find difficulties to evaluate existing systems with focus on security to countermeasure the various attacks for either implementation in a real operator or future enhancement. ...

متن کامل

Data Security Algorithms for Cloud Storage System using Cryptographic Method

Cloud computing paradigm enables the users to access the outsourced data from the cloud server without the hardware and software management. For the effective utilization of sensitive data from CSP, the data owner encrypts before outsourcing to the cloud server. To protect data in cloud, data privacy is the challenging task. In order to address this problem, we proposed an efficient data securi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: The International Conference on Electrical Engineering

سال: 2008

ISSN: 2636-4441

DOI: 10.21608/iceeng.2008.34211