10th IEEE Symposium on Computers and Communications (ISCC'05)
DOI: 10.1109/iscc.2005.129
|View full text |Cite
|
Sign up to set email alerts
|

QoS Control Using an End-Point CPU Capability Detector in a Secure VoIP System

Abstract: Security is a serious bottleneck for the future of VoIP. Because of the time-critical nature of VoIP most of the same security measures currently implemented in today's data networks could not be used in VoIP networks. Two main factors affect voice traffic over secure IP channels. The first is the time required to encrypt payload and headers and the construction of the new ones. The second is the increased packet size because of the headers added to the original IP packet. Techniques that could be adopted to o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
11
0
1

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 12 publications
(12 citation statements)
references
References 7 publications
0
11
0
1
Order By: Relevance
“…Subsequently, they propose an adaptive scheme where the selection of encryption algorithm to be used in protecting traffic is made with consideration of the CPU capabilities of both communicating parties [91], [92].…”
Section: D) Captchas and Puzzles (4 Items)mentioning
confidence: 99%
“…Subsequently, they propose an adaptive scheme where the selection of encryption algorithm to be used in protecting traffic is made with consideration of the CPU capabilities of both communicating parties [91], [92].…”
Section: D) Captchas and Puzzles (4 Items)mentioning
confidence: 99%
“…Also, a symmetric key can contain a stream cipher and a block cipher; the block cipher will be used here. The concept of a block cipher is to divide the text into fairly bulky blocks, for instance, 128 bits, then encode every block individually [2] [3].…”
Section: Introductionmentioning
confidence: 99%
“…Compression technology techniques have developed as well as security systems. Furthermore, nowadays, computers, laptops, smartphones and other communication products have hundreds of applications that provide multimedia services over IP networks for free such as Skype [3]. The characteristics of RTA require a high bandwidth because of their large size.…”
Section: Introductionmentioning
confidence: 99%