Uncovering Spoken Phrases in Encrypted Voice over IP Conversations
نویسندگان
چکیده
منابع مشابه
Yes We Can: Uncovering Spoken Phrases in Encrypted VoIP Conversations
The growing importance of VoIP telephony over untrusted networks raises the requirements to encrypt VoIP calls. To achieve a good trade-off between audio quality and network traffic, Variable Bit Rate (VBR) codecs are widely employed. VBR codecs encode speech data at different bit rates depending on the complexity of the input signal. We implemented a practical side channel attack on VoIP appli...
متن کاملA secure archive for Voice-over-IP conversations
An efficient archive securing the integrity of VoIP-based two-party conversations is presented. The solution is based on chains of hashes and continuously chained electronic signatures. Security is concentrated in a single, efficient component, allowing for a detailed analysis.
متن کاملSecurity and Non-Repudiation for Voice-Over-IP Conversations
This thesis presents a concept to achieve non-repudiation for natural language conversations by electronically signing continuous, packet-based, digital voice communication (VoIP). Signing a VoIP-based conversation means to protect the integrity and authenticity of the bidirectional data stream and its temporal sequence which together establish the security context of the communication. The sol...
متن کاملVoice Over Quantum IP*
In recent years, there are growing interests to provide telephone services over the Internet. In particular, Internet Services Providers (ISPs) may become the next generation telephone company especially in providing international telephone services. This paper proposes a novel method called quantum IP (QIP) for transporting international voice traffic over the Internet via QIP routers. Emulati...
متن کاملSecure Voice-over-IP
Voice-over-IP (VoIP) is one of the main applications or services, which dramatically increased the spread and usage of the Internet. VoIP describes the transmission and reception of voice and video data over networks that use the “internet protocol” (IP) as transport protocol. With the use of VoIP within company networks (intranet) investors hope to reduce the expenses for infrastructure and ma...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: ACM Transactions on Information and System Security
سال: 2010
ISSN: 1094-9224,1557-7406
DOI: 10.1145/1880022.1880029