2013 1st International Conference on Communications, Signal Processing, and Their Applications (ICCSPA) 2013
DOI: 10.1109/iccspa.2013.6487300
|View full text |Cite
|
Sign up to set email alerts
|

Performance analysis of VoIP client with integrated encryption module

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
4
0
1

Year Published

2015
2015
2021
2021

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 3 publications
0
4
0
1
Order By: Relevance
“…Sasaran penelitian ini dilakukan yaitu untuk, mendapatkan metode yang tepat, untuk melakukan enkripsi agar paket video conference tidak terlihat (terenkripsi) dan kompatibel dan mengetahui secara statistic hasil performa video coding (codec) H.264 dan H.264-HP jika terenkripsi. [1].…”
Section: Pendahuluanunclassified
“…Sasaran penelitian ini dilakukan yaitu untuk, mendapatkan metode yang tepat, untuk melakukan enkripsi agar paket video conference tidak terlihat (terenkripsi) dan kompatibel dan mengetahui secara statistic hasil performa video coding (codec) H.264 dan H.264-HP jika terenkripsi. [1].…”
Section: Pendahuluanunclassified
“…According to the ITU, VoIP takes place based routing network in general, while VoIP is a subset of IP Telephony, it is for communication between device entirely or partially over the Internet. On its development, the telecommunication industries use the metro ethernet [3] [4].…”
Section: Introductionmentioning
confidence: 99%
“…In general, VoIP security issues are very similar to other cyber security issues, like call hijacking, ID spoofing, Denial of Service, as well as phishing and malware threats (see, e.g., [2]). To address these risks, security mechanisms such as encryption, entity authentication and deep packet inspection are widely used (see, e.g., [3][4][5]), whilst building a network with VoIP traffic in a Virtual Private Network has been also considered [6]. Several attacks on VoIP technologies have been mounted, based on the absence of security protocols, or weaknesses of the protocols, or of their implementations (see, e.g., [7][8][9][10][11][12][13][14][15]).…”
Section: Introductionmentioning
confidence: 99%