2011
DOI: 10.1016/j.jnca.2010.10.011
|View full text |Cite
|
Sign up to set email alerts
|

A dependable privacy protection for end-to-end VoIP via Elliptic-Curve Diffie-Hellman and dynamic key changes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
20
0

Year Published

2011
2011
2017
2017

Publication Types

Select...
6
3
1

Relationship

0
10

Authors

Journals

citations
Cited by 36 publications
(20 citation statements)
references
References 17 publications
0
20
0
Order By: Relevance
“…Skype uses its own proprietary secure VoIP communication protocol [22]. All the packets of Skype communication are encrypted with the 256-bit Advanced Encryption Standard (AES) [23].…”
Section: Overviewmentioning
confidence: 99%
“…Skype uses its own proprietary secure VoIP communication protocol [22]. All the packets of Skype communication are encrypted with the 256-bit Advanced Encryption Standard (AES) [23].…”
Section: Overviewmentioning
confidence: 99%
“…The first method by Yang et al (2005) proposes an enhanced version of a challenge-response authentication concept, which relies on the difficulty of discrete logarithms. The second method by Wang and Liu (2011) also proposes a similar enhanced two tier challenge-response authentication strategy, by applying the elliptical-curve Diffie-Hellman (ECDH) algorithm and a key generation function (KGF). These methods are able to protect both host and client endpoints against password guessing attacks and server spoofing.…”
Section: Multipoint Video Conferencing Session Protection Structurementioning
confidence: 99%
“…The SIP proxy server is an intermediate device that receives SIP messages from clients and then forwards them to their destination SIP proxy servers through the WMNs. Compared with common telephone systems, VoIP over WMNs has to face more challenges including not only the speech quality degradation from delay-jitter and packet loss, but also the privacy threats [14][15][16][17]. In [2], A. D. Keromytis surveyed over 200 vulnerabilities in SIP implementations that had been disclosed in the CVE database from 1999 to 2009.…”
Section: Sip-based Secure Voip Communication Over Wmnsmentioning
confidence: 99%