VoIP is now considered one of the most commonly deployed technologies all over the world. VoIP applications. During this project: a secure peer to peer voice call communication system. This will be achieved by employing three encryption methods; DES, 3-DES and AES algorithms. A JAVA program using these three methods will be developed for the encryption and decryption stages.This program is run on the client sides in order to establish secure VoIP connection for the voice data. This means that higher level of security can be achieved by encrypting voice data itself.A comparison is between the three applied encryption methods based on the encryption and decryption delays.
Die Inhaltsangabe kann sich auf eine andere Ausgabe dieses Titels beziehen.
VoIP is now considered one of the most commonly deployed technologies all over the world. VoIP applications. During this project: a secure peer to peer voice call communication system. This will be achieved by employing three encryption methods; DES, 3-DES and AES algorithms. A JAVA program using these three methods will be developed for the encryption and decryption stages.This program is run on the client sides in order to establish secure VoIP connection for the voice data. This means that higher level of security can be achieved by encrypting voice data itself.A comparison is between the three applied encryption methods based on the encryption and decryption delays.
Author received Msc Communication Engineering at De Montfort University United Kingdom in Sep 2014.Bachelor of King Fahd Security College, Riyadh, Saudi Arabia. Diploma computer networks at college of technology & information, Riyadh, Saudi Arabia.
„Über diesen Titel“ kann sich auf eine andere Ausgabe dieses Titels beziehen.
EUR 29,66 für den Versand von Vereinigtes Königreich nach Deutschland
Versandziele, Kosten & DauerGratis für den Versand innerhalb von/der Deutschland
Versandziele, Kosten & DauerAnbieter: moluna, Greven, Deutschland
Zustand: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Autor/Autorin: Alotaibi MutlaqAuthor received Msc Communication Engineering at De Montfort University United Kingdom in Sep 2014.Bachelor of King Fahd Security College, Riyadh, Saudi Arabia. Diploma computer networks at college of technology & info. Bestandsnummer des Verkäufers 158876101
Anzahl: Mehr als 20 verfügbar
Anbieter: buchversandmimpf2000, Emtmannsberg, BAYE, Deutschland
Taschenbuch. Zustand: Neu. Neuware -VoIP is now considered one of the most commonly deployed technologies all over the world. VoIP applications. During this project: a secure peer to peer voice call communication system. This will be achieved by employing three encryption methods; DES, 3-DES and AES algorithms. A JAVA program using these three methods will be developed for the encryption and decryption stages.This program is run on the client sides in order to establish secure VoIP connection for the voice data. This means that higher level of security can be achieved by encrypting voice data itself.A comparison is between the three applied encryption methods based on the encryption and decryption delays.Books on Demand GmbH, Überseering 33, 22297 Hamburg 76 pp. Englisch. Bestandsnummer des Verkäufers 9783659716782
Anzahl: 2 verfügbar
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Taschenbuch. Zustand: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - VoIP is now considered one of the most commonly deployed technologies all over the world. VoIP applications. During this project: a secure peer to peer voice call communication system. This will be achieved by employing three encryption methods; DES, 3-DES and AES algorithms. A JAVA program using these three methods will be developed for the encryption and decryption stages.This program is run on the client sides in order to establish secure VoIP connection for the voice data. This means that higher level of security can be achieved by encrypting voice data itself.A comparison is between the three applied encryption methods based on the encryption and decryption delays. Bestandsnummer des Verkäufers 9783659716782
Anzahl: 1 verfügbar
Anbieter: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Deutschland
Taschenbuch. Zustand: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -VoIP is now considered one of the most commonly deployed technologies all over the world. VoIP applications. During this project: a secure peer to peer voice call communication system. This will be achieved by employing three encryption methods; DES, 3-DES and AES algorithms. A JAVA program using these three methods will be developed for the encryption and decryption stages.This program is run on the client sides in order to establish secure VoIP connection for the voice data. This means that higher level of security can be achieved by encrypting voice data itself.A comparison is between the three applied encryption methods based on the encryption and decryption delays. 76 pp. Englisch. Bestandsnummer des Verkäufers 9783659716782
Anzahl: 2 verfügbar
Anbieter: Mispah books, Redhill, SURRE, Vereinigtes Königreich
Paperback. Zustand: Like New. Like New. book. Bestandsnummer des Verkäufers ERICA80036597167826
Anzahl: 1 verfügbar