2010 First International Conference on Parallel, Distributed and Grid Computing (PDGC 2010) 2010
DOI: 10.1109/pdgc.2010.5679889
|View full text |Cite
|
Sign up to set email alerts
|

Randomness evaluation of stream cipher for secure mobile communication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2011
2011
2016
2016

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 7 publications
0
2
0
Order By: Relevance
“…Can the proposed system provides high security to the voice signal? To realize this, a number of voice encryption techniques have been studded [3][4][5][6][7][8][9][10][11][12][13][14][15][16]. From these researches, the chaotic system was regarded as an efficient technique for voice data.…”
Section: Introductionmentioning
confidence: 99%
“…Can the proposed system provides high security to the voice signal? To realize this, a number of voice encryption techniques have been studded [3][4][5][6][7][8][9][10][11][12][13][14][15][16]. From these researches, the chaotic system was regarded as an efficient technique for voice data.…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, the design of efficient voice security methods demands new challenges which can provide high security to the voice data. To achieve this, a number of voice encryption techniques have been suggested [2][3][4][5][6][7][8][9][10][11][12]. Among them, the chaos-based techniques are considered efficient for dealing with bulky, redundant voice data.…”
Section: Introductionmentioning
confidence: 99%