Confidentiality of VOIP
Confidentiality of VOIP data using efficient ECDH key exchanging mechanism
FREE-DOWNLOAD [PDF] from wseas.usT Subashri, KK Reddy… – Proceedings of the 8th WSEAS …, 2010
Abstract—The most demanding low cost technology is voice over internet protocol (VoIP).
However, VoIP packets are easy to eavesdrop by hackers on public and private
cryptosystems. Because symmetric key cryptosystems such as Advanced Encryption