Confidentiality of VOIP-computer science, free research papers


Confidentiality of VOIP data using efficient ECDH key exchanging mechanism

FREE-DOWNLOAD [PDF] from wseas.usT Subashri, KK Reddy… – Proceedings of the 8th WSEAS …, 2010
Abstract—The most demanding low cost technology is voice over internet protocol (VoIP).
However, VoIP packets are easy to eavesdrop by hackers on public and private
cryptosystems. Because symmetric key cryptosystems such as Advanced Encryption





Related

COMMENT computer science, free research papers





FREE IEEE PAPER
IEEE PROJECTS IEEE PAPERS 2018 2017 2016 EEE ECE FREE DOWNLOAD PDF COMPUTER SCIENCE NEW IEEE PROJECTS CSE IEEE MINI PROJECTS