Ramparts: A programmer-friendly system for building homomorphic encryption applications
DW Archer, JM Calderón Trilla, J Dagit… - Proceedings of the 7th …, 2019 - dl.acm.org
Homomorphic Encryption (HE) is an emerging technology that enables computing on data
while the data is encrypted. A major challenge with homomorphic encryption is that it takes …
while the data is encrypted. A major challenge with homomorphic encryption is that it takes …
[PDF][PDF] Homomorphic Encryption for Secure Computation on Big Data.
RA Hallman, MH Diallo, MA August, CT Graves - IoTBDS, 2018 - pdfs.semanticscholar.org
With the ubiquity of mobile devices and the emergence of Internet of Things (IoT)
technologies, most of our activities contribute to ever-growing data sets which are used for …
technologies, most of our activities contribute to ever-growing data sets which are used for …
Software-defined security controller-based group management and end-to-end security management
This paper proposes group management and end-to-end security management based on
the horizontal model suitable for group based private systems. The software-defined security …
the horizontal model suitable for group based private systems. The software-defined security …
Now is the Time: Scalable and Cloud-supported Audio Conferencing using End-to-End Homomorphic Encryption
Homomorphic encryption (HE) allows computations on encrypted data, leaking neither the
input nor the computational output. While the method has historically been infeasible to use …
input nor the computational output. While the method has historically been infeasible to use …
Voice over internet protocol voicemail security system using two factor authentication and biometric prints with new efficient hybrid cryptosystem
EM Elshamy, AI Hussein, HFA Hamed… - Multimedia Tools and …, 2021 - Springer
New hybrid cryptosystems represent a highly effective method for increasing security levels
of Voice over Internet Protocol (VoIP) systems. In this paper, a dual-security cryptosystem for …
of Voice over Internet Protocol (VoIP) systems. In this paper, a dual-security cryptosystem for …
Truzcall: secure voip calling on android using arm trustzone
Use of mobile phones today has become pervasive throughout society. A common use of a
phone involves calling another person using VoIP apps. However the OSes on mobile …
phone involves calling another person using VoIP apps. However the OSes on mobile …
Design and implementation of compatible VoIP
In this paper, we propose a simplified way of voice communication over Wireless Local Area
Network (WLAN) using Internet Protocol, without using internet connectivity at any end in …
Network (WLAN) using Internet Protocol, without using internet connectivity at any end in …
Hardware Assisted Homomorphic Encryption in a Real Time VOIP Conference Application
A Kamal, H Dahshan, A Diaa - 2018 13th International …, 2018 - ieeexplore.ieee.org
In this paper, a new scheme to perform a secure Voice over IP (VoIP) teleconferencing
between a number of VOIP Clients is proposed. The Teleconference is done between clients …
between a number of VOIP Clients is proposed. The Teleconference is done between clients …
[PDF][PDF] ОБОБЩЕННАЯ МОДЕЛЬ ЗАЩИТЫ ОТ КИБЕРАТАК НА VOIP
КЕ Израилов, АК Макарова… - Вопросы …, 2023 - cyberrus.info
Полученный результат: произведена систематизация основных способов кибератаки
на VoIP и методов защиты от них, исходя из существующих Best Practices и научных …
на VoIP и методов защиты от них, исходя из существующих Best Practices и научных …
Performance analysis of secure real-time transport protocol using elliptic curves
The growing popularity of streaming audio/video is enhancing the popularity of real-time
media applications and services. People use real-time media applications for voice/video …
media applications and services. People use real-time media applications for voice/video …