Reinforcement of VoIP Security with Multipath Routing and Secret Sharing Scheme
暂无分享,去创建一个
Yôiti Suzuki | Ryouichi Nishimura | Norihiro Fujita | Shun'ichiro Abe | Yôiti Suzuki | Shun'ichiro Abe | R. Nishimura | Norihiro Fujita
[1] Juan Carlos De Martin,et al. Perception-based selective encryption of G.729 speech , 2002, 2002 IEEE International Conference on Acoustics, Speech, and Signal Processing.
[2] Chang-Chou Lin,et al. Secret image sharing with capability of share data reduction , 2003 .
[3] Adi Shamir,et al. How to share a secret , 1979, CACM.
[4] Moni Naor,et al. Visual Cryptography , 1994, Encyclopedia of Multimedia.
[5] Yuguang Fang,et al. A multipath routing approach for secure data delivery , 2001, 2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No.01CH37277).
[6] Richard D. Gitlin,et al. Diversity coding for transparent self-healing and fault-tolerant communication networks , 1993, IEEE Trans. Commun..
[7] Hari Balakrishnan,et al. Resilient overlay networks , 2001, SOSP.
[8] S. Hayashi,et al. Design and description of CS-ACELP: a toll quality 8 kb/s speech coder , 1998, IEEE Trans. Speech Audio Process..
[9] Jinhua Guo,et al. Security Challenge and Defense in VoIP Infrastructures , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[10] Sung-Ju Lee,et al. Split multipath routing with maximally disjoint paths in ad hoc networks , 2001, ICC 2001. IEEE International Conference on Communications. Conference Record (Cat. No.01CH37240).
[11] Deepinder P. Sidhu,et al. Finding disjoint paths in networks , 1991, SIGCOMM '91.
[12] J.D. Gibson,et al. Selective encryption and scalable speech coding for voice communications over multi-hop wireless links , 2004, IEEE MILCOM 2004. Military Communications Conference, 2004..
[13] Akitoshi Kataoka,et al. A cryptic encoding method for G.729 using variation in bit‐reversal sensitivity , 2007 .
[14] Juan Carlos De Martin,et al. Perception-based partial encryption of compressed speech , 2002, IEEE Trans. Speech Audio Process..
[15] Ali C. Begen,et al. Multi-path selection for multiple description encoded video streaming , 2003, IEEE International Conference on Communications, 2003. ICC '03..
[16] Danilo Bruschi,et al. Voice over IPsec: analysis and solutions , 2002, 18th Annual Computer Security Applications Conference, 2002. Proceedings..
[17] A. Wyner,et al. Source coding for multiple descriptions , 1980, The Bell System Technical Journal.
[18] Nachum Shacham,et al. Distributed algorithms for computing shortest pairs of disjoint paths , 1993, IEEE Trans. Inf. Theory.
[19] Yao Wang,et al. Multiple Description Coding for Video Delivery , 2005, Proceedings of the IEEE.
[20] Zygmunt J. Haas,et al. Multipath routing in the presence of frequent topological changes , 2001, IEEE Commun. Mag..
[21] Alan B. Johnston,et al. Understanding Voice over Ip Security (Artech House Telecommunications Library) , 2006 .
[22] Dhananjay S. Phatak,et al. A novel mechanism for data streaming across multiple IP links for improving throughput and reliability in mobile environments , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.
[23] G. R. BLAKLEY. Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[24] Chi-keung Julian Wong. Coding of speech at 16 kbit/s using low-delay code excited linear prediction (LD-CELP) , 2010 .