The impact of security on VoIP call quality
Modern multimedia communication tools must have high security, high availability and high quality of service (QoS). Any security implementation will directly impact on QoS. This paper will investigate how end-to-end security impacts on QoS in Voice over Internet Protocol (VoIP). The QoS is measured...
| Main Authors: | Radmand, Pedram, Singh, Jaipal, Talevski, Alex, Domingo, M., Arnedo, J. |
|---|---|
| Format: | Journal Article |
| Published: |
Ricton Press, Inc
2011
|
| Subjects: | |
| Online Access: | http://hdl.handle.net/20.500.11937/46012 |
Similar Items
Effects of Fully Redundant Dispersity Routing on VoIP Quality
by: Bettermann, Stephan, et al.
Published: (2011)
by: Bettermann, Stephan, et al.
Published: (2011)
Estimating the Deliverable Quality of a Fully Redundant Dispersity Routing System
by: Bettermann, Stephan, et al.
Published: (2011)
by: Bettermann, Stephan, et al.
Published: (2011)
Effective online learning experiences: exploring potential relationships between Voice-over-Internet-Protocol (VoIP) learning environments and adult learners’ motivation, multiple intelligences, and learning styles
by: Scott, Donald E.
Published: (2009)
by: Scott, Donald E.
Published: (2009)
VoIP: making secure calls and maintaining high call quality
by: Radmand, Pedram, et al.
Published: (2010)
by: Radmand, Pedram, et al.
Published: (2010)
QoS multicast routing using explore best path
by: Singh, Jaipal, et al.
Published: (2006)
by: Singh, Jaipal, et al.
Published: (2006)
Secure mobile VoIP
by: Talevski, Alex, et al.
Published: (2007)
by: Talevski, Alex, et al.
Published: (2007)
Mobility and quality of service in wireless multicast infrastructure
by: Singh, Jaipal, et al.
Published: (2005)
by: Singh, Jaipal, et al.
Published: (2005)
Multicast QoS Routing Using Collaborative Path Exploration
by: Singh, Jaipal
Published: (2010)
by: Singh, Jaipal
Published: (2010)
Call quality monitoring for VoIP
by: Bayley, T., et al.
Published: (2011)
by: Bayley, T., et al.
Published: (2011)
Is the future in VoIP
Published: (2008)
Published: (2008)
Business service composability on the basis of trust
by: Hammadi, Adil, et al.
Published: (2009)
by: Hammadi, Adil, et al.
Published: (2009)
Intellectual property infringement in fashion: insufficient enforcement and how blockchain may change the landscape
by: Lapatoura, Ioanna
Published: (2024)
by: Lapatoura, Ioanna
Published: (2024)
New synchronization protocol for distributed system with TCP extension
by: Bayat, Peyman
Published: (2013)
by: Bayat, Peyman
Published: (2013)
Impact of Encryption on Qos in Voip
by: Radmand, Pedram, et al.
Published: (2010)
by: Radmand, Pedram, et al.
Published: (2010)
High-resolution mapping of in vivo genomic transcription factor binding sites using in situ DNase I footprinting and ChIP-seq
by: Chumsakul, Onuma, et al.
Published: (2013)
by: Chumsakul, Onuma, et al.
Published: (2013)
VoIP evidence model: a new forensic method for investigating VoIP malicious attacks
by: Ibrahim, Mohammed, et al.
Published: (2012)
by: Ibrahim, Mohammed, et al.
Published: (2012)
Weighted Window for TCP Fair Bandwidth Allocation in Wireless Lans
by: Seyedzadegan, Mojtaba
Published: (2008)
by: Seyedzadegan, Mojtaba
Published: (2008)
Internet call delay on peer to peer and phone to phone VoIP network
by: A.M., Said, et al.
Published: (2009)
by: A.M., Said, et al.
Published: (2009)
Transactional risk assessment-based approach for service degradability management
by: Hammadi, Adil, et al.
Published: (2011)
by: Hammadi, Adil, et al.
Published: (2011)
Prioritizing Information for Achieving QoS Control in WSN
by: Sharif, Atif, et al.
Published: (2010)
by: Sharif, Atif, et al.
Published: (2010)
VoIP in next generation converged networks
by: Toral-Cruz, Homero, et al.
Published: (2013)
by: Toral-Cruz, Homero, et al.
Published: (2013)
Performance analysis of voice codec for VoIP
by: Abd. Khuther, Ali
Published: (2008)
by: Abd. Khuther, Ali
Published: (2008)
Intellectual property protection for agricultural biotechnological inventions: a case of Malaysia
by: Ismail, Suzi Fadhilah
Published: (2011)
by: Ismail, Suzi Fadhilah
Published: (2011)
Tcp Performance Optimization In Interaction With Mac Layer Over Multi-Hop Ad-Hoc Networks
by: Armaghani, Farzaneh R.
Published: (2008)
by: Armaghani, Farzaneh R.
Published: (2008)
Privacy optimization and intrusion detection in modbus/tcp network-based scada in water distribution systems
by: Franco, Daniel Jose Da Graca Peceguina
Published: (2021)
by: Franco, Daniel Jose Da Graca Peceguina
Published: (2021)
A service search engine for the industrial digital ecosystems
by: Dong, Hai, et al.
Published: (2011)
by: Dong, Hai, et al.
Published: (2011)
A Subcarrier and Power Allocation Algorithm for OFDMA Full-Duplex Systems
by: Cirik, A., et al.
Published: (2015)
by: Cirik, A., et al.
Published: (2015)
A modified approach to improve the performance of AES using feistel structure
by: Al-Ansi, Afeef Yahya Ahmed
Published: (2018)
by: Al-Ansi, Afeef Yahya Ahmed
Published: (2018)
Speech codec for a Voice over IP (VoIP) systems
by: Khalifa, Othman Omran, et al.
Published: (2011)
by: Khalifa, Othman Omran, et al.
Published: (2011)
Packet based echo cancellation for VoIP networks
by: Abdul Rashid, Hairul Azhar
Published: (2007)
by: Abdul Rashid, Hairul Azhar
Published: (2007)
VoIP in developing countries: the next disruptive technology?
by: Banerjee, A., et al.
Published: (2008)
by: Banerjee, A., et al.
Published: (2008)
IDC : VoIP players must adapt to challenges
Published: (2008)
Published: (2008)
Security Study and Encryption / Decryption Method
by: Al-Qdah, Majdi Taysir
Published: (2000)
by: Al-Qdah, Majdi Taysir
Published: (2000)
Key Transformation Approach for Rijndael Security
by: Sulong, Mek Rahmah
Published: (2008)
by: Sulong, Mek Rahmah
Published: (2008)
Prepaid And Postpaid Voice Over IP (VoIP) Architecture For Rural Areas
by: Ismail, Mohd Nazri
Published: (2007)
by: Ismail, Mohd Nazri
Published: (2007)
Tool selection and the ventral‐dorsal organization of tool‐related knowledge
by: Tobia, Michael J., et al.
Published: (2017)
by: Tobia, Michael J., et al.
Published: (2017)
ZigBee/ZigBee PRO Security Assessment Based on Compromised Cryptographic Keys
by: Radmand, Pedram, et al.
Published: (2010)
by: Radmand, Pedram, et al.
Published: (2010)
Wireless multimedia sensor network technology: a survey
by: Sharif, Atif, et al.
Published: (2009)
by: Sharif, Atif, et al.
Published: (2009)
The effect of echo delay on voice quality in VoIP network
by: A.M., Said, et al.
Published: (2009)
by: A.M., Said, et al.
Published: (2009)
Allele-specific RNA interference rescues the long-QT syndrome phenotype in human-induced pluripotency stem cell cardiomyocytes
by: Matsa, Elena, et al.
Published: (2013)
by: Matsa, Elena, et al.
Published: (2013)
Similar Items
-
Effects of Fully Redundant Dispersity Routing on VoIP Quality
by: Bettermann, Stephan, et al.
Published: (2011) -
Estimating the Deliverable Quality of a Fully Redundant Dispersity Routing System
by: Bettermann, Stephan, et al.
Published: (2011) -
Effective online learning experiences: exploring potential relationships between Voice-over-Internet-Protocol (VoIP) learning environments and adult learners’ motivation, multiple intelligences, and learning styles
by: Scott, Donald E.
Published: (2009) -
VoIP: making secure calls and maintaining high call quality
by: Radmand, Pedram, et al.
Published: (2010) -
QoS multicast routing using explore best path
by: Singh, Jaipal, et al.
Published: (2006)