Ramparts: A programmer-friendly system for building homomorphic encryption applications

DW Archer, JM Calderón Trilla, J Dagit… - Proceedings of the 7th …, 2019 - dl.acm.org
Homomorphic Encryption (HE) is an emerging technology that enables computing on data
while the data is encrypted. A major challenge with homomorphic encryption is that it takes …

[PDF][PDF] Homomorphic Encryption for Secure Computation on Big Data.

RA Hallman, MH Diallo, MA August, CT Graves - IoTBDS, 2018 - pdfs.semanticscholar.org
With the ubiquity of mobile devices and the emergence of Internet of Things (IoT)
technologies, most of our activities contribute to ever-growing data sets which are used for …

Software-defined security controller-based group management and end-to-end security management

E Festijo, Y Jung, M Peradilla - Journal of Ambient Intelligence and …, 2019 - Springer
This paper proposes group management and end-to-end security management based on
the horizontal model suitable for group based private systems. The software-defined security …

Now is the Time: Scalable and Cloud-supported Audio Conferencing using End-to-End Homomorphic Encryption

D Hasselquist, N Johansson, N Carlsson - Proceedings of the 2023 on …, 2023 - dl.acm.org
Homomorphic encryption (HE) allows computations on encrypted data, leaking neither the
input nor the computational output. While the method has historically been infeasible to use …

Voice over internet protocol voicemail security system using two factor authentication and biometric prints with new efficient hybrid cryptosystem

EM Elshamy, AI Hussein, HFA Hamed… - Multimedia Tools and …, 2021 - Springer
New hybrid cryptosystems represent a highly effective method for increasing security levels
of Voice over Internet Protocol (VoIP) systems. In this paper, a dual-security cryptosystem for …

Truzcall: secure voip calling on android using arm trustzone

A Ahlawat, W Du - … Conference on Mobile And Secure Services …, 2020 - ieeexplore.ieee.org
Use of mobile phones today has become pervasive throughout society. A common use of a
phone involves calling another person using VoIP apps. However the OSes on mobile …

Design and implementation of compatible VoIP

N Brahmbhatt, P Mann, A Rawat - 2017 6th international …, 2017 - ieeexplore.ieee.org
In this paper, we propose a simplified way of voice communication over Wireless Local Area
Network (WLAN) using Internet Protocol, without using internet connectivity at any end in …

Hardware Assisted Homomorphic Encryption in a Real Time VOIP Conference Application

A Kamal, H Dahshan, A Diaa - 2018 13th International …, 2018 - ieeexplore.ieee.org
In this paper, a new scheme to perform a secure Voice over IP (VoIP) teleconferencing
between a number of VOIP Clients is proposed. The Teleconference is done between clients …

[PDF][PDF] ОБОБЩЕННАЯ МОДЕЛЬ ЗАЩИТЫ ОТ КИБЕРАТАК НА VOIP

КЕ Израилов, АК Макарова… - Вопросы …, 2023 - cyberrus.info
Полученный результат: произведена систематизация основных способов кибератаки
на VoIP и методов защиты от них, исходя из существующих Best Practices и научных …

Performance analysis of secure real-time transport protocol using elliptic curves

N Sen, R Dantu, M Thompson - 2020 IEEE International …, 2020 - ieeexplore.ieee.org
The growing popularity of streaming audio/video is enhancing the popularity of real-time
media applications and services. People use real-time media applications for voice/video …