Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Cryptography and Network Security: Principles and Practice
Cryptography and Network Security: Principles and Practice
Comparison of Voice Activity Detection Algorithms for VoIP
ISCC '02 Proceedings of the Seventh International Symposium on Computers and Communications (ISCC'02)
A matricial public key cryptosystem with digital signature
WSEAS Transactions on Mathematics
An optimized pseudorandom generator using packed matrices
WSEAS Transactions on Information Science and Applications
RC5-based security in wireless sensor networks: utilization and performance
WSEAS Transactions on Computers
Hi-index | 0.00 |
We analyze the impact of silence detection applied to secure P2P VoIP multiconferencing. Under the assumption that the number of simultaneous conversations is small regardless of the amount of participants we propose considering simple audio broadcasting as the basis of the multiconference scheme and study different alternatives regarding multiplexing, cryptographic primitives and implementation issues.