Multimedia: computing, communications and applications
Multimedia: computing, communications and applications
SIGCOMM '95 Proceedings of the conference on Applications, technologies, architectures, and protocols for computer communication
Packet audio playout delay adjustment: performance bounds and algorithms
Multimedia Systems
Successful multiparty audio communication over the Internet
Communications of the ACM
Packet loss effects on MPEG video sent over the public Internet
MULTIMEDIA '98 Proceedings of the sixth ACM international conference on Multimedia
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Comparing the QoS of Internet audio mechanisms via formal methods
ACM Transactions on Modeling and Computer Simulation (TOMACS)
PGP: Pretty Good Privacy
GSM and Personal Communications Handbook
GSM and Personal Communications Handbook
Multimedia Tools and Applications
FSE '97 Proceedings of the 4th International Workshop on Fast Software Encryption
Efficient Authentication and Signing of Multicast Streams over Lossy Channels
SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
Voice Communication Across the Interne: A Network Voice Terminal Schulzrinne Henning
Voice Communication Across the Interne: A Network Voice Terminal Schulzrinne Henning
Improved fast correlation attacks using parity-check equations of weight 4 and 5
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
Control mechanisms for packet audio in the internet
INFOCOM'96 Proceedings of the Fifteenth annual joint conference of the IEEE computer and communications societies conference on The conference on computer communications - Volume 1
Hi-index | 0.01 |
We analyze and compare several soft real-time applications designed for the secure transmission of packetized audio over the Internet. The main metrics we consider for the purposes of our analysis are (i) the computational load due to the coding/decoding phases, and (ii) the computational overhead of the encryption/decryption activities, carried out by the audio tools of interest. The main result we present is that an appropriate degree of security may be guaranteed to real-time audio communications at a negligible computational cost if the adopted security strategies are integrated together with the playout control mechanism incorporated in the audio tools.