Amanote Research
Register
Sign In
Cryptanalysis of a Data Security Protection Scheme for VoIP
IEE Proceedings - Vision, Image, and Signal Processing
doi 10.1049/ip-vis:20045234
Full Text
Open PDF
Abstract
Available in
full text
Date
January 1, 2006
Authors
C. Li
S. Li
D. Zhang
G. Chen
Publisher
Institution of Engineering and Technology (IET)
Related search
Ant Colony Optimization Based Handoff Scheme and Verifiable Secret Sharing Security With M-M Scheme for VoIP
International Journal of Intelligent Engineering and Systems
Engineering
Computer Science
An Efficient Packetization Scheme for Voip
Protection for Multi Owner Data Sharing Scheme
Bonfring International Journal of Advances in Image Processing
Cryptanalysis of a Biometric-Based Multi-Server Authentication Scheme
International Journal of Security and its Applications
Computer Science
Cryptanalysis of a Certificateless Aggregate Signature Scheme for Healthcare Wireless Sensor Network
Security and Communication Networks
Computer Networks
Information Systems
Communications
A New Coding Scheme for Data Security in RF Based Wireless Communication
Intelligent Applications for Heterogeneous System Modeling and Design
Cryptanalysis of the Revised NTRU Signature Scheme
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Cryptanalysis of a Computer Cryptography Scheme Based on a Filter Bank
Chaos, Solitons and Fractals
Nonlinear Physics
Applied Mathematics
Statistical
Mathematics
Astronomy
Physics
TUKAB: An Efficient NAT Traversal Scheme on Security of VoIP Network System Based on Session Initiation Protocol
Journal of Computing and Information Technology
Computer Science