Login / Signup
Stream or Block Cipher for Securing VoIP?
Ashraf D. Elbayoumy
Simon J. Shepherd
Published in:
Int. J. Netw. Secur. (2007)
Keyphrases
</>
block cipher
data streams
hash functions
s box
secret key
real time
lightweight
application layer
similarity measure
quality of service
information security