Login / Signup
Secure End-to-End Voice Communication: A Comprehensive Review of Steganography, Modem-Based Cryptography, and Chaotic Cryptography Techniques.
Albertus Anugerah Pekerti
Arif Sasongko
Adi Indrayanto
Published in:
IEEE Access (2024)
Keyphrases
</>
end to end
cellular automata
high bandwidth
information security
wireless ad hoc networks
admission control
ad hoc networks
congestion control
content delivery
application layer
real time
multi hop
resource constrained
rate allocation
computer networks
scalable video