메뉴 건너뛰기




Volumn 2003, Issue 10, 2003, Pages 1027-1042

On Securing Real-Time Speech Transmission Over the Internet: An Experimental Study

Author keywords

Internet; Multimedia applications; Real time; Security

Indexed keywords

INTERNET; MULTIMEDIA SYSTEMS; PACKET SWITCHING; REAL TIME SYSTEMS; SECURITY OF DATA; CRYPTOGRAPHY; SPEECH COMMUNICATION;

EID: 0141923373     PISSN: 11108657     EISSN: None     Source Type: Journal    
DOI: 10.1155/S1110865703304019     Document Type: Article
Times cited : (3)

References (43)
  • 2
    • 0033690336 scopus 로고    scopus 로고
    • Efficient authentication and signing of multicast streams over lossy channels
    • Oakland, Calif, USA, May
    • A. Perrig, R. Canetti, J. D. Tygar, and D. Song, "Efficient authentication and signing of multicast streams over lossy channels," in Proc. IEEE Symposium on Security and Privacy, pp. 56-73, Oakland, Calif, USA, May 2000.
    • (2000) Proc. IEEE Symposium on Security and Privacy , pp. 56-73
    • Perrig, A.1    Canetti, R.2    Tygar, J.D.3    Song, D.4
  • 3
    • 0141948248 scopus 로고    scopus 로고
    • Digital audio presentation and compression
    • B. Furht, Ed., CRC Press, Boca Raton, Fla, USA
    • R. Westwater, "Digital audio presentation and compression," in Handbook of Multimedia Computing, B. Furht, Ed., pp. 135-147, CRC Press, Boca Raton, Fla, USA, 1999.
    • (1999) Handbook of Multimedia Computing , pp. 135-147
    • Westwater, R.1
  • 6
    • 0019116956 scopus 로고
    • Effects of packet loss on waveform coded speech
    • Atlanta, Ga, USA, October
    • N. Jayant, "Effects of packet loss on waveform coded speech," in Proc. 5th Data Communications Symposium, pp. 275-280, Atlanta, Ga, USA, October 1980.
    • (1980) Proc. 5th Data Communications Symposium , pp. 275-280
    • Jayant, N.1
  • 9
    • 0002953665 scopus 로고    scopus 로고
    • Packet audio play-out delay adjustment: Performance bounds and algorithms
    • S. B. Moon, J. Kurose, and D. Towsley, "Packet audio play-out delay adjustment: performance bounds and algorithms," ACM Multimedia Systems, vol. 6, no. 1, pp. 17-28, 1998.
    • (1998) ACM Multimedia Systems , vol.6 , Issue.1 , pp. 17-28
    • Moon, S.B.1    Kurose, J.2    Towsley, D.3
  • 10
    • 0035337204 scopus 로고    scopus 로고
    • Design and experimental evaluation of an adaptive playout delay control mechanism for packetized audio for use over the Internet
    • M. Roccetti, V. Ghini, G. Pau, P. Salomoni, and M. E. Bonfigli, "Design and experimental evaluation of an adaptive playout delay control mechanism for packetized audio for use over the Internet," Multimedia Tools and Applications, vol. 14, no. 1, pp. 23-53, 2001.
    • (2001) Multimedia Tools and Applications , vol.14 , Issue.1 , pp. 23-53
    • Roccetti, M.1    Ghini, V.2    Pau, G.3    Salomoni, P.4    Bonfigli, M.E.5
  • 11
    • 0003927519 scopus 로고    scopus 로고
    • Craig Potton Publishing, Nelson, New Zealand
    • N. Hager, Secret Power, Craig Potton Publishing, Nelson, New Zealand, 1996.
    • (1996) Secret Power
    • Hager, N.1
  • 15
  • 16
    • 84948963512 scopus 로고    scopus 로고
    • Improved fast correlation attacks using parity-check equations of weight 4 and 5
    • Advances in Cryptology - EUROCRYPT '00, International Conference on the Theory and Application of Cryptographic Techniques, Springer-Verlag, Bruges, Belgium, May
    • A. Canteaut and M. Trabbia, "Improved fast correlation attacks using parity-check equations of weight 4 and 5," in Advances in Cryptology - EUROCRYPT '00, International Conference on the Theory and Application of Cryptographic Techniques, vol. 1807 of Lecture Notes in Computer Science, pp. 573-588, Springer-Verlag, Bruges, Belgium, May 2000.
    • (2000) Lecture Notes in Computer Science , vol.1807 , pp. 573-588
    • Canteaut, A.1    Trabbia, M.2
  • 17
    • 23044522041 scopus 로고    scopus 로고
    • Decimation attack of stream ciphers
    • Proc. First International Conference on Cryptology in India (INDOCRYPT 2000), Springer Verlag
    • E. Filiol, "Decimation attack of stream ciphers," in Proc. First International Conference on Cryptology in India (INDOCRYPT 2000), vol. 1977 of Lecture Notes in Computer Science, pp. 31-42, Springer Verlag, 2000.
    • (2000) Lecture Notes in Computer Science , vol.1977 , pp. 31-42
    • Filiol, E.1
  • 18
    • 0141982815 scopus 로고    scopus 로고
    • Information Security Corporation, "SecurePhone Professional," 2002, http://www.infoseccorp.com.
    • (2002) SecurePhone Professional
  • 19
    • 0141913850 scopus 로고    scopus 로고
    • EarthSpeak International LLC
    • EarthSpeak International LLC, "SecuriPhone V. 1.09," 2002, http://www.jechtech.com/securiphone.htm.
    • (2002) SecuriPhone V. 1.09
  • 20
    • 0141948246 scopus 로고    scopus 로고
    • NetSpeak Corporation
    • NetSpeak Corporation, "NetSpeak Webphone User's Guide," 1998, http://www.k2nesoft.corn/webphone/.
    • (1998) NetSpeak Webphone User's Guide
  • 21
    • 0141879164 scopus 로고    scopus 로고
    • Microsoft, "NetMeeting 3 Resource Kit," 1999, http://www. microsoft.com/windows/netmeeting/.
    • (1999) NetMeeting 3 Resource Kit
  • 24
    • 0032057945 scopus 로고    scopus 로고
    • Successful multi-party audio communication over the Internet
    • V. Hardman, M. A. Sasse, and I. Kouvelas, "Successful multi-party audio communication over the Internet," Communications of the ACM, vol. 41, no. 5, pp. 74-80, 1998.
    • (1998) Communications of the ACM , vol.41 , Issue.5 , pp. 74-80
    • Hardman, V.1    Sasse, M.A.2    Kouvelas, I.3
  • 25
    • 0003855464 scopus 로고    scopus 로고
    • John Wiley & Sons, New York, NY, USA, 2nd edition
    • B. Schneier, Applied Cryptography, John Wiley & Sons, New York, NY, USA, 2nd edition, 1996.
    • (1996) Applied Cryptography
    • Schneier, B.1
  • 26
    • 0141879162 scopus 로고    scopus 로고
    • An adaptive mechanism for real-time secure speech transmission over the Internet
    • H. Schulzrinne, Ed., Columbia University, New York, NY, USA, April
    • A. Aldini, R. Gorrieri, and M. Roccetti, "An adaptive mechanism for real-time secure speech transmission over the Internet," in Proc. 2nd IP-Telephony Workshop (IP-Tel '01), H. Schulzrinne, Ed., pp. 64-72, Columbia University, New York, NY, USA, April 2001.
    • (2001) Proc. 2nd IP-telephony Workshop (IP-Tel '01) , pp. 64-72
    • Aldini, A.1    Gorrieri, R.2    Roccetti, M.3
  • 27
    • 0141948244 scopus 로고    scopus 로고
    • Secure real time speech transmission over the Internet: Performance analysis and simulation
    • B. Waite and A. Nisanci, Eds., Society for Computer Simulation International, Vancouver, British Columbia, Canada, July
    • M. Roccetti, "Secure real time speech transmission over the Internet: performance analysis and simulation," in Proc. Summer Computer Simulation Conference (SCSC '00), B. Waite and A. Nisanci, Eds., pp. 939-944, Society for Computer Simulation International, Vancouver, British Columbia, Canada, July 2000.
    • (2000) Proc. Summer Computer Simulation Conference (SCSC '00) , pp. 939-944
    • Roccetti, M.1
  • 28
    • 0141982813 scopus 로고    scopus 로고
    • Adaptive control mechanisms for packet audio over the Internet
    • F. Broeckx and L. Pauwels, Eds., Society for Computer Simulation International, Antwerp, Belgium, May
    • M. Roccetti, "Adaptive control mechanisms for packet audio over the Internet," in Proc. SCS Euromedia Conference (EURO-MEDIA '00), F. Broeckx and L. Pauwels, Eds., pp. 151-155, Society for Computer Simulation International, Antwerp, Belgium, May 2000.
    • (2000) Proc. SCS Euromedia Conference (EURO-MEDIA '00) , pp. 151-155
    • Roccetti, M.1
  • 29
    • 0141879163 scopus 로고    scopus 로고
    • IP security protocol
    • Orlando, Fla, USA, December, Internet Drafts
    • Internet Engineering Task Force, "IP security protocol," in Proc. 43th IETF Meeting, Orlando, Fla, USA, December 1998, Internet Drafts available at http://www.ietf.org.
    • (1998) Proc. 43th IETF Meeting
  • 30
    • 0003602325 scopus 로고
    • MIT Laboratory for Computer Science and RSA Data Security
    • R. L. Rivest, The MD5 Message-Digest Algorithm, MIT Laboratory for Computer Science and RSA Data Security, 1992.
    • (1992) The MD5 Message-digest Algorithm
    • Rivest, R.L.1
  • 32
    • 0004004901 scopus 로고
    • O'Reilly & Associates, Sebastopol, Calif, USA
    • S. Garfinkel, PGP: Pretty Good Privacy, O'Reilly & Associates, Sebastopol, Calif, USA, 1994.
    • (1994) PGP: Pretty Good Privacy
    • Garfinkel, S.1
  • 33
    • 0020720357 scopus 로고
    • On the security of public key protocols
    • D. Dolev and A. C. Yao, "On the security of public key protocols," IEEE Transactions on Information Theory, vol. 29, no. 2, pp. 198-208, 1983.
    • (1983) IEEE Transactions on Information Theory , vol.29 , Issue.2 , pp. 198-208
    • Dolev, D.1    Yao, A.C.2
  • 34
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • R. L. Rivest, A. Shamir, and L. M. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Communications of the ACM, vol. 21, no. 2, pp. 120-126, 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.M.3
  • 36
    • 0141879159 scopus 로고    scopus 로고
    • A software-optimized encryption algorithm
    • P. Rogaway and D. Coppersmith, "A software-optimized encryption algorithm," Journal of Cryptology, vol. 11, no. 4, pp. 273-287, 1998.
    • (1998) Journal of Cryptology , vol.11 , Issue.4 , pp. 273-287
    • Rogaway, P.1    Coppersmith, D.2
  • 40
    • 84955593890 scopus 로고    scopus 로고
    • Fast hashing on the Pentium
    • Advances in Cryptology - CRYPTO '96, 16th Annual International Cryptology Conference, N. Koblitz, Ed., Springer-Verlag, Santa Barbara, Calif, USA
    • A. Bosselaers, R. Govaerts, and J. Vandewalle, "Fast hashing on the Pentium," in Advances in Cryptology - CRYPTO '96, 16th Annual International Cryptology Conference, N. Koblitz, Ed., vol. 1109 of Lectures Notes in Computer Science, pp. 298-312, Springer-Verlag, Santa Barbara, Calif, USA, 1996.
    • (1996) Lectures Notes in Computer Science , vol.1109 , pp. 298-312
    • Bosselaers, A.1    Govaerts, R.2    Vandewalle, J.3
  • 41
    • 0344076611 scopus 로고    scopus 로고
    • Even faster hashing on the Pentium
    • Konstanz, Germany, May
    • A. Bosselaers, "Even faster hashing on the Pentium," in Proc. Rump Session of Eurocrypt (Eurocrypt '97), Konstanz, Germany, May 1997, http://www.esat.kuleuven.ac.be/̃bosselae/publications.html.
    • (1997) Proc. Rump Session of Eurocrypt (Eurocrypt '97)
    • Bosselaers, A.1
  • 42
    • 84947902207 scopus 로고    scopus 로고
    • Fast software encryption: Designing encryption algorithms for optimal software speed on the Intel Pentium Processor
    • Springer-Verlag, Haifa, Israel, January
    • B. Schneier and D. Whiting, "Fast software encryption: designing encryption algorithms for optimal software speed on the Intel Pentium Processor," in Proc. 4th Fast Software Encryption Workshop (FSE '97), pp. 242-259, Springer-Verlag, Haifa, Israel, January 1997.
    • (1997) Proc. 4th Fast Software Encryption Workshop (FSE '97) , pp. 242-259
    • Schneier, B.1    Whiting, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.