Lecture notes in computer sciences; 218 on Advances in cryptology---CRYPTO 85
The official PGP user's guide
The Twofish encryption algorithm: a 128-bit block cipher
The Twofish encryption algorithm: a 128-bit block cipher
SAC '99 Proceedings of the 6th Annual International Workshop on Selected Areas in Cryptography
End-to-end confidentiality for continuous-media applications in wireless systems
End-to-end confidentiality for continuous-media applications in wireless systems
Software generation of practically strong random numbers
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
Rayleigh fading channels in mobile digital communication systems .II. Mitigation
IEEE Communications Magazine
IEEE Communications Magazine
Hi-index | 0.00 |
With the advent of ubiquitous access to multimedia content via wireless networks, users are more likely to have their data traverse a heterogeneous internetwork. Given the open nature of the Internet and wireless links, more users will demand end-to-end confidentiality. However, because of inherent error-expansion properties of secret-key encryption, it is a challenge to provide good subjective quality and end-to-end confidentiality for multimedia data, particularly in network environments subject to both loss and corruption impairments. This paper analyzes the affect end-to-end confidentiality has on the quality of service (QoS) in Voice over IP (VoIP) networks. To satisfy a given QoS objective, we show that mitigating the error-expansion caused by confidentiality comes at a cost. We measure this cost by increased delay, reduced bandwidth, and reduced traffic capacity. Thus, for this class of applications, we motivate the need for error-robust encryption and introduce one such technique in this paper.