In this work we propose a secure architecture for Voice-over-IP (VoIP) that encapsulates all security and privacy critical components and I/O functions into ...
Our proof-of-concept implementation shows that high security and reliance on established standards and software (e.g., device drivers, transmission control, and ...
In this work we propose a secure architecture for Voice-over-IP (VoIP) that encapsulates all security and privacy critical components and I/O functions into ...
A hardware-assisted proof-of-concept for secure VoIP clients on untrusted operating systems. Maik Ender · ORCID. RUB Icon. ,; Gerd Düppmann,; Alexander Wild.
People also ask
What hardware and software are used to help prevent unauthorized users from accessing a person's data?
Which protocol protects the contents of a VoIP connection?
A hardware-assisted proof-of-concept for secure VoIP clients on untrusted operating systems. M Ender, G Düppmann, A Wild, T Poppelmann, T Güneysu. 2014 ...
A hardware-assisted proof-of-concept for secure VoIP clients on untrusted operating systems. 2014 International Conference on ReConFigurable Computing and ...
2017. A hardware-assisted proof-of-concept for secure VoIP clients on untrusted operating systems. M Ender, G Düppmann, A Wild, T Poppelmann, T Güneysu. 2014 ...
A hardware-assisted proof-of-concept for secure VoIP clients on untrusted operating systems. M Ender, G Düppmann, A Wild, T Poppelmann, T Güneysu. 2014 ...
A design to allow a user to make a secure end-to-end protected VoIP call from a compromised mobile phone, TruzCall using Android OS and TrustZone TEE ...
“A Hardware-Assisted Proof-of-Concept for Secure VoIP Clients on. Untrusted Operating Systems,” in Proceedings of 2014 International. Conference on ...