Login / Signup
Can I Add a Secure VoIP Call?.
Arlen Nascimento
Alexandre Passito
Edjair de Souza Mota
Edson Nascimento Silva Jr.
Leandro S. G. de Carvalho
Published in:
WOWMOM (2006)
Keyphrases
</>
cryptographic protocols
quality of service
network architecture
ip networks
neural network
authentication scheme
lightweight
neural network model
security requirements
standard model
user privacy
security measures
data encryption
covert channel