Author:
Ahmad Musheer,Alam Bashir,Farooq Omar
Publisher
Springer Berlin Heidelberg
Reference13 articles.
1. VoIP Security Alliance. VoIP Security and Privacy Threat Taxonomy, version 1.0, http://www.voipsa.org/Activities/taxonomy.php (last accessed in July 2011)
2. Orceyre, M.J., Heller, R.M.: An Approach to Secure Voice Communication Based on the Data Encryption Standard. IEEE Communications Society Magazine, 41–50 (1978)
3. Lin, Q.H., Yin, F.L., Mei, T.M., Liang, H.: A Blind Source Separation Based Method for Speech Encryption. IEEE Transaction on Circuits and Systems-I 53(6), 1320–1328 (2006)
4. Su, Z., Jiang, J., Lian, S., Hu, D., Liang, C., Zhang, G.: Selective Encryption for G.729 Speech using Chaotic Maps. In: Multimedia Information Networking and Security, pp. 488–492 (2009)
5. Guo, J.I., Yen, J.C., Pai, H.F.: New Voice over Internet Protocol technique with Hierarchical Data Security Protection. IEE Proceedings Vision, Image & Signal Processing 149(4), 237–243 (2002)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献