AA Pekerti, A Sasongko, A Indrayanto - IEEE Access, 2024 - ieeexplore.ieee.org
Secure end-to-end voice communication is crucial, but it has several issues. Researchers in this field can benefit from a review paper with broader evaluation parameters than existing …
MA Shah, S Zhang, C Maple - 2013 19th International …, 2013 - ieeexplore.ieee.org
Cognitive Radio (CR) has emerged as an intelligent technology to address the spectrum scarcity issues. CR aims to use the unoccupied spectrum band when it is not used by the …
Telephones remain a trusted platform for conducting some of our most sensitive exchanges. From banking to taxes, wide swathes of industry and government rely on telephony as a …
Global system for mobile communication (GSM) is widely used digital mobile service around the world. Although GSM was designed as a secure wireless system, it is now vulnerable to …
This paper categorizes, presents and evaluates a set of schemes and solutions that provide end-to-end encryption for voice communications. First, we analyze the research works that …
Cellular networks provide widespread and reliable voice communications among subscribers through mobile voice channels. These channels benefit from superior priority …
MA Özkan, SB Örs - 2015 IEEE 5th International Conference on …, 2015 - ieeexplore.ieee.org
Global System for Mobile Communications (GSM) technology still plays a key role because of its availability, reliability and robustness. Recently, additional consumer applications are …
Due to the availability, robustness and reliability; Global System for Mobile Communications (GSM) plays a vital role in our daily life. GSM security is not so strong and is susceptible to …
D Qi, N Longmei - Procedia computer science, 2018 - Elsevier
In this paper a new speech privacy protection method based on sound masking and speech corpus is proposed. Frames in the speech corpus are selected according to secret keys and …