STEM: Secure Telephony Enabled Middlebox.
Brennen ReynoldsDipak GhosalPublished in: IEEE Commun. Mag. (2002)
Keyphrases
- video conferencing
- security requirements
- security analysis
- covert channel
- identity management
- security issues
- standard model
- artificial intelligence
- search engine
- data encryption
- key exchange
- security mechanisms
- key management
- encryption scheme
- stream cipher
- user authentication
- real world
- highly efficient
- access control
- low cost
- sensor networks
- information retrieval