[PDF][PDF] Introducing a Verified Authenticated Key Exchange Protocol over Voice Channels for Secure Voice Communication.

P Krasnowski, J Lebrun, B Martin - ICISSP, 2020 - pdfs.semanticscholar.org
Increasing need for secure voice communication is leading to new ideas for securing voice
transmission. This work relates to a relatively new concept of sending encrypted speech as …

Exchanging Keys with Authentication and Identity Protection for Secure Voice Communication without Side-channel

P Krasnowski, J Lebrun, B Martin - arXiv preprint arXiv:2211.07186, 2022 - arxiv.org
Motivated by an increasing need for privacy-preserving voice communications, we
investigate here the original idea of sending encrypted data and speech in the form of …

[PDF][PDF] An Analysis of VoIP Secure Key Exchange Protocols Against Man-In-The-Middle Attack

G Aghila, D Chandirasekaran - International Journal of Computer …, 2011 - Citeseer
This paper presents a brief survey about the existing key exchange protocols namely
MIKEY, ZRTP and SDES. The core features of these protocols and their suitability to SIP …

Joint source-cryptographic-channel coding for real-time secure voice communications on voice channels

P Krasnowski - 2021 - theses.hal.science
The growing risk of privacy violation and espionage associated with the rapid spread of
mobile communications renewed interest in the original concept of sending encrypted voice …

Key Agreement for secure Voice over IP

J Bilien - 2003 - diva-portal.org
Key Agreement for Secure Voice over IP Page 1 Master of Science Thesis Stockholm,
Sweden 2003 IMIT/LCN 2003-14 JOHAN BILIEN Key Agreement for Secure Voice over IP …

[PDF][PDF] Development of key exchange protocol to enhance security of voice over internet protocol on mobile phone

AP Putra - International Journal on Electrical Engineering and …, 2017 - ijeei.org
A system of securing voice communication on mobile phone based on peer-to-peer SIP
protocol (P2PSIP) is discussed in this paper. This paper presents a new key exchange …

[PDF][PDF] New cryptographic algorithms for enhancing security of voice data

OMA Al-hazaimeh - 2010 - core.ac.uk
ABSTRACT A real-time application Voice over Internet Protocol (VoIP) is the technology that
enables voice packets transmission over internet protocol (IP). Security is of concern …

A new approach to authenticating and encrypting Voice over Internet Protocol communications

J Lago‐Fernández, F Gil‐Castiñeira… - Software: Practice …, 2014 - Wiley Online Library
Traditionally, call authentication and security have not raised user concerns because
wiretapping requires physical access to the phone line and special equipment. However …

An overview of the tactical secure voice cryptographic interoperability specification

T Moran, D Heide, S Shah - 2010-MILCOM 2010 MILITARY …, 2010 - ieeexplore.ieee.org
The Tactical Secure Voice Working Group was formed by the National Security Agency in
2008 to ensure that modernized tactical secure voice devices will be interoperable across …

Transaction-based authentication and key agreement protocol for inter-domain VoIP

P Battistello, J Garcia-Alfaro, C Delétré - Journal of Network and Computer …, 2012 - Elsevier
We present an authentication and key agreement protocol to secure Voice over IP call
establishment between interconnection proxies of different domains. The protocol operates …