Confidentiality of VOIP


Confidentiality of VOIP data using efficient ECDH key exchanging mechanism

FREE-DOWNLOAD [PDF] from wseas.usT Subashri, KK Reddy… – Proceedings of the 8th WSEAS …, 2010
Abstract—The most demanding low cost technology is voice over internet protocol (VoIP).
However, VoIP packets are easy to eavesdrop by hackers on public and private
cryptosystems. Because symmetric key cryptosystems such as Advanced Encryption







Confidentiality of VOIP IEEE PAPER

COMMENT computer science, free research papers









FREE IEEE PAPER
IEEE-PAPER

IEEE PROJECTS IEEE PAPERS 2018 2017 2016 EEE ECE FREE DOWNLOAD PDF COMPUTER SCIENCE NEW IEEE PROJECTS CSE IEEE MINI PROJECTS