16,99 €
inkl. MwSt.

Versandfertig in 1-2 Wochen
payback
8 °P sammeln
  • Broschiertes Buch

VoIP is now considered one of the most commonly deployed technologies all over the world. VoIP applications. During this project: a secure peer to peer voice call communication system. This will be achieved by employing three encryption methods; DES, 3-DES and AES algorithms. A JAVA program using these three methods will be developed for the encryption and decryption stages.This program is run on the client sides in order to establish secure VoIP connection for the voice data. This means that higher level of security can be achieved by encrypting voice data itself.A comparison is between the…mehr

Produktbeschreibung
VoIP is now considered one of the most commonly deployed technologies all over the world. VoIP applications. During this project: a secure peer to peer voice call communication system. This will be achieved by employing three encryption methods; DES, 3-DES and AES algorithms. A JAVA program using these three methods will be developed for the encryption and decryption stages.This program is run on the client sides in order to establish secure VoIP connection for the voice data. This means that higher level of security can be achieved by encrypting voice data itself.A comparison is between the three applied encryption methods based on the encryption and decryption delays.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Autorenporträt
Author received Msc Communication Engineering at De Montfort University United Kingdom in Sep 2014.Bachelor of King Fahd Security College, Riyadh, Saudi Arabia. Diploma computer networks at college of technology & information, Riyadh, Saudi Arabia.