메뉴 건너뛰기




Volumn , Issue , 2006, Pages 3703-3708

Security enhancement on VoIP using chaotic cryptography

Author keywords

[No Author keywords available]

Indexed keywords

CHAOTIC SYSTEMS; ELECTRONICS INDUSTRY; INDUSTRIAL ELECTRONICS; INTERNET; INTERNET PROTOCOLS; INTERNET TELEPHONY; SECURITY OF DATA; STANDARDS; TELEPHONE; TELEPHONE CIRCUITS; TELEPHONE SETS; TELEPHONE SYSTEMS; VOICE/DATA COMMUNICATION SYSTEMS;

EID: 50249186262     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/IECON.2006.347351     Document Type: Conference Paper
Times cited : (8)

References (12)
  • 1
    • 0036697706 scopus 로고    scopus 로고
    • New voice over Internet protocol technique with hierarchical data security protection
    • Aug
    • J.-l. Guo, J.-C. Yen and H.-F. Pai, "New voice over Internet protocol technique with hierarchical data security protection," IEE Proc.-Vis. Image Signal Process., vol. 149, no. 4, Aug. 2002, pp. 237-243.
    • (2002) IEE Proc.-Vis. Image Signal Process , vol.149 , Issue.4 , pp. 237-243
    • Guo, J.-L.1    Yen, J.-C.2    Pai, H.-F.3
  • 2
    • 33645526435 scopus 로고    scopus 로고
    • Cryptanalysis of a data security protection scheme for VoIP
    • Feb
    • C. Li, S. Li, D. Zhang and G. Chen. "Cryptanalysis of a data security protection scheme for VoIP," IEE Proc.-Vis. Image Signal Process., vol. 153, no. 1, Feb. 2006, pp. 1-10.
    • (2006) IEE Proc.-Vis. Image Signal Process , vol.153 , Issue.1 , pp. 1-10
    • Li, C.1    Li, S.2    Zhang, D.3    Chen, G.4
  • 3
    • 29244445112 scopus 로고    scopus 로고
    • A more secure chaotic cryptographic scheme based on dynamic look-up table
    • Oct
    • K. W. Wong, K. P. Man, S. Li, and X. Liao, "A more secure chaotic cryptographic scheme based on dynamic look-up table," Circuits, Systems and Signal Processing, vol. 24, no. 5, Oct. 2005, pp. 571-584.
    • (2005) Circuits, Systems and Signal Processing , vol.24 , Issue.5 , pp. 571-584
    • Wong, K.W.1    Man, K.P.2    Li, S.3    Liao, X.4
  • 4
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • R. L. Rivest, A. Shamir, and L. M. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Communications of the ACM, vol. 21, no. 2, 1978, pp. 120-126.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.M.3
  • 5
    • 84968503742 scopus 로고
    • Elliptic curve cryptosystems
    • N. Koblitz, "Elliptic curve cryptosystems," Mathematics of Computation, vol. 48, no. 177, 1987, pp. 203-209.
    • (1987) Mathematics of Computation , vol.48 , Issue.177 , pp. 203-209
    • Koblitz, N.1
  • 6
    • 0042786512 scopus 로고    scopus 로고
    • Cryptography with chaos
    • Mar
    • M. S. Baptista, "Cryptography with chaos," Phys. Lett. A, vol. 240, Mar. 1998, pp. 50-54.
    • (1998) Phys. Lett. A , vol.240 , pp. 50-54
    • Baptista, M.S.1
  • 7
    • 0037053849 scopus 로고    scopus 로고
    • A fast chaotic cryptography scheme with dynamic look-up table
    • June
    • K. W. Wong, "A fast chaotic cryptography scheme with dynamic look-up table," Phys. Lett. A, vol. 298, June 2002, pp. 238-242.
    • (2002) Phys. Lett. A , vol.298 , pp. 238-242
    • Wong, K.W.1
  • 8
    • 0035881532 scopus 로고    scopus 로고
    • Modified chaotic cryptographic method
    • Aug
    • W. K. Wong, L. P. Lee and K. W. Wong, "Modified chaotic cryptographic method," Computer Physics Communication, vol. 138, no. 3, Aug. 2001, pp. 234-236.
    • (2001) Computer Physics Communication , vol.138 , Issue.3 , pp. 234-236
    • Wong, W.K.1    Lee, L.P.2    Wong, K.W.3
  • 9
    • 0037424907 scopus 로고    scopus 로고
    • A chaotic cryptographic scheme for generating short ciphertext
    • Apr
    • K. W. Wong, S. W. Ho and C. K. Yung, "A chaotic cryptographic scheme for generating short ciphertext," Phys. Lett. A, vol. 310, Apr. 2003, pp. 67-73.
    • (2003) Phys. Lett. A , vol.310 , pp. 67-73
    • Wong, K.W.1    Ho, S.W.2    Yung, C.K.3
  • 10
    • 0037454786 scopus 로고    scopus 로고
    • Performance analysis of Jakimoski-Kocarev attack on a class of chaotic cryptosystems
    • Jan
    • S. Li, X. Mou, Z. Ji, J. Zhang and Y. Cai, "Performance analysis of Jakimoski-Kocarev attack on a class of chaotic cryptosystems," Phys. Lett. A, vol. 307, no. 1, Jan. 2003, pp. 22-28.
    • (2003) Phys. Lett. A , vol.307 , Issue.1 , pp. 22-28
    • Li, S.1    Mou, X.2    Ji, Z.3    Zhang, J.4    Cai, Y.5
  • 11
    • 7644243295 scopus 로고    scopus 로고
    • Baptista-type chaotic cryptosystems: Problems and countermeasures
    • Nov
    • S. Li, G. Chen, K. W. Wong, X. Mou and Y. Cai, "Baptista-type chaotic cryptosystems: Problems and countermeasures," Phys. Lett. A, vol. 332, no. 5-6, Nov. 2004, pp. 368-375.
    • (2004) Phys. Lett. A , vol.332 , Issue.5-6 , pp. 368-375
    • Li, S.1    Chen, G.2    Wong, K.W.3    Mou, X.4    Cai, Y.5
  • 12
    • 50249134689 scopus 로고    scopus 로고
    • OpenH323 project, available online at
    • OpenH323 project, available online at http://www.openh323.org/


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.