Enhancing Security Protocol For Voip Communication Using Modified Vector Quantization
VoIP has introduced a new set of challenge that practically unheard off when a landline phone was used. Session Initiation Protocol (SIP) is often used as the main signaling protocol in VoIP. However, the lack of security feature has exposed SIP to a number of network threats. Public Key Infra...
| Main Author: | Jaafar, Mohd Yazid Mohd |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2013
|
| Subjects: | |
| Online Access: | http://eprints.usm.my/45268/ http://eprints.usm.my/45268/1/Mohd%20Yazid%20Mohd%20Jaafar24.pdf |
Similar Items
Internet Telephony Transport Protocol (ITTP): An Efficient Transport Protocol For Voip Applications
by: Abu-Alhaj, Mosleh Mohammad
Published: (2011)
by: Abu-Alhaj, Mosleh Mohammad
Published: (2011)
Self-Verification Of Public-Key
Agreement Over Voip Using Random
Fusion Scheme
by: Alfin Syafalni, Alfin Syafalni
Published: (2016)
by: Alfin Syafalni, Alfin Syafalni
Published: (2016)
Enhanced Bluetooth Low Energy 5 Aodv-Based Mesh Communication Protocol With Multipath Support
by: Ghori, Muhammad Rizwan
Published: (2023)
by: Ghori, Muhammad Rizwan
Published: (2023)
Packet based echo cancellation for VoIP networks
by: Abdul Rashid, Hairul Azhar
Published: (2007)
by: Abdul Rashid, Hairul Azhar
Published: (2007)
Dynamic Handwritten Signature Verification Based on Statistical Quantization Mechanism
by: Ong, Thian Song, et al.
Published: (2009)
by: Ong, Thian Song, et al.
Published: (2009)
Integrating Identity-Based Encryption (Ibe) In The Return Routability Protocol (Rrp) To Enhance Signals Security
In Mobile Ipv6.
by: S. Alsayfi, Majed Salam
Published: (2010)
by: S. Alsayfi, Majed Salam
Published: (2010)
On the Rila-Mitchell security protocols for biometrics-based cardholder authentication in smartcards
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
On the Rila-Mitchell security protocols for biometrics-based cardholder authentication in smartcards
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
The Dynamic Host Configuration Protocol Version 6 Security And Privacy Mechanism
by: Ibrahim, Ayman Khallel
Published: (2020)
by: Ibrahim, Ayman Khallel
Published: (2020)
Security analysis of TORA routing protocol
by: Chee, Vee Liem, et al.
Published: (2007)
by: Chee, Vee Liem, et al.
Published: (2007)
Random Multispace Quantization as an Analytic Mechanism for BioHashing of Biometric and Random Identity Inputs
by: Teoh, A.B.J., et al.
Published: (2006)
by: Teoh, A.B.J., et al.
Published: (2006)
Mobile Cloud And Cloudlets Gaming System (Mccg) Using Clustered Destination-Sequenced Distance Vector Routing Protocol(C-DSDV)
by: Doraisamy, Vaithegy
Published: (2020)
by: Doraisamy, Vaithegy
Published: (2020)
Enhanced Techniques For Detection And Classification Of Neighbor Discovery Protocol Anomalies
by: Firas (M.H.) S., Najjar
Published: (2016)
by: Firas (M.H.) S., Najjar
Published: (2016)
Hybrid Mac Protocol With Intra- Cluster Communications For Extending Wireless Sensor Network Lifetimes
by: Elsmany, Eyman Fathelrhman Ahmed
Published: (2019)
by: Elsmany, Eyman Fathelrhman Ahmed
Published: (2019)
CST334 – Network Monitoring & Security (Pengawasan & Keselamatan Rangkaian) CST338 – Network & Communication Security (Keselamatan Rangkaian & Komunikasi)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2022)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2022)
CST334 – Network Monitoring & Security
(Pengawasan & Keselamatan Rangkaian)
CST338 – Network And Communication Security
(Keselamatan Rangkaian Dan Komunikasi)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2023)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2023)
Enhancing The Quality Of Service In Mobile Networks Based On Nemo Basic Support Protocol
by: Alshaibani, Badiea Abdulkarem Mohammed
Published: (2018)
by: Alshaibani, Badiea Abdulkarem Mohammed
Published: (2018)
A Study On The Effects Of Noise Level, Cleaning Method, And Vectorization Software On The Quality Of Vector Data.
by: Al-Khaffaf, Hasan, et al.
Published: (2007)
by: Al-Khaffaf, Hasan, et al.
Published: (2007)
Enhancing security on IPv6 neighbor discovery using trust-ND.
by: Chong , Yung Wey
Published: (2017)
by: Chong , Yung Wey
Published: (2017)
A New Approach to Enhance E-mail Performance through POP3 Protocol
by: Al Bazar, Hussein, et al.
Published: (2008)
by: Al Bazar, Hussein, et al.
Published: (2008)
Automatic And Person-Independent
Detection Of 3d Facial Expressions
Using Enhanced Support Vector
Machine With Probability Estimation
by: Abdullah, Amal Abdulaziz
Published: (2014)
by: Abdullah, Amal Abdulaziz
Published: (2014)
Automatic And Person-Independent
Detection Of 3d Facial Expressions
Using Enhanced Support Vector
Machine With Probability Estimation
by: Abdullah, Amal Abdulaziz
Published: (2014)
by: Abdullah, Amal Abdulaziz
Published: (2014)
A systematic study of PESQ's behavior in simulated VoIP environment (from reference signal characteristics perspective)
by: Peter, Pocta, et al.
Published: (2008)
by: Peter, Pocta, et al.
Published: (2008)
An Efficient Safety System For Vanet Using Enhanced Message Dissemination Protocols With Channel Performance Control
by: Samara, Ghassan Abedalkarim Abdullah
Published: (2012)
by: Samara, Ghassan Abedalkarim Abdullah
Published: (2012)
Conceptual Vectors, A Complementary Tool To Lexical Networks.
by: Schwab, Didier, et al.
Published: (2007)
by: Schwab, Didier, et al.
Published: (2007)
Online securities trading and control of securities offences in Malaysia
by: Jawahitha, , Sarabdeen, et al.
Published: (2006)
by: Jawahitha, , Sarabdeen, et al.
Published: (2006)
Online securities trading and control of securities offences in Malaysia
by: Jawahitha, , Sarabdeen, et al.
Published: (2006)
by: Jawahitha, , Sarabdeen, et al.
Published: (2006)
A Comparison Between Inter-Asterisk eXchange
Protocol and Jingle Protocol: Session Time
by: Haj Aliwi, H. S., et al.
Published: (2016)
by: Haj Aliwi, H. S., et al.
Published: (2016)
Enhancement Of Login Process Multi-Server Conmmnication For Multimedia Conferencing System (Mcs) Using Distributed Lightweight Directory Access Protocol (Ldap).
by: Abu Saleh, Mohammad Abdelmo'ti
Published: (2010)
by: Abu Saleh, Mohammad Abdelmo'ti
Published: (2010)
Mobile robot path planning using hybrid genetic algorithm and traversability vectors method
by: Loo, , CK, et al.
Published: (2004)
by: Loo, , CK, et al.
Published: (2004)
Hybridization Of Optimized Support
Vector Machine And Artificial Neural
Network For The Diabetic Retinopathy
Classification Problem
by: Kader, Nur Izzati Ab
Published: (2019)
by: Kader, Nur Izzati Ab
Published: (2019)
Protocol Based Interaction in Component-Based Software Systems.
by: Alhazbi, Saleh, et al.
Published: (2007)
by: Alhazbi, Saleh, et al.
Published: (2007)
A model for secure knowledge sharing
by: Ismail Ahmad,, et al.
Published: (2005)
by: Ismail Ahmad,, et al.
Published: (2005)
Flaws in generic watermarking protocols based on zero-knowledge proofs
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
CST332 - INTERNET PROTOCOL ARCHITECTURE & ROUTING APRIL 2008.
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2008)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2008)
CST332 - INTERNET PROTOCOLS, ARCHITECTURE AND ROUTING JANUARY 2012
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2012)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2012)
A proposed mapping architecture between IAX and jingle protocols
by: Haj Aliwi, Hadeel Saleh, et al.
Published: (2016)
by: Haj Aliwi, Hadeel Saleh, et al.
Published: (2016)
CST 332 - INTERNET PROTOCOL ARCHITECTURE & ROUTING APRIL 08.
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2008)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2008)
CST332 – Internet Protocols, Architecture & Routing January 2018
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2018)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2018)
CST235/CST231/CSM331 – Principles of Computer Networks and Information Security (Prinsip Rangkaian Komputer dan Keselamatan Maklumat)/Data Communications and Networks (Komunikasi Data dan Rangkaian)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2021)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2021)
Similar Items
-
Internet Telephony Transport Protocol (ITTP): An Efficient Transport Protocol For Voip Applications
by: Abu-Alhaj, Mosleh Mohammad
Published: (2011) -
Self-Verification Of Public-Key
Agreement Over Voip Using Random
Fusion Scheme
by: Alfin Syafalni, Alfin Syafalni
Published: (2016) -
Enhanced Bluetooth Low Energy 5 Aodv-Based Mesh Communication Protocol With Multipath Support
by: Ghori, Muhammad Rizwan
Published: (2023) -
Packet based echo cancellation for VoIP networks
by: Abdul Rashid, Hairul Azhar
Published: (2007) -
Dynamic Handwritten Signature Verification Based on Statistical Quantization Mechanism
by: Ong, Thian Song, et al.
Published: (2009)