Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Secure Internet telephony: design, implementation and performance measurements
KTH, School of Information and Communication Technology (ICT), Electronic, Computer and Software Systems, ECS.
2006 (English)Licentiate thesis, comprehensive summary (Other scientific)
Place, publisher, year, edition, pages
Stockholm: KTH , 2006. , 11 p.
Series
Trita-ICT-ECS AVH, ISSN 1653-6363 ; 06:04
National Category
Telecommunications
Identifiers
URN: urn:nbn:se:kth:diva-4080OAI: oai:DiVA.org:kth-4080DiVA: diva2:10656
Presentation
2006-06-15, Sal E, KTH-Forum, Isafjordsgatan 39, plan 5, Kista, 13:00
Opponent
Supervisors
Note
QC 20101111Available from: 2006-08-22 Created: 2006-08-22 Last updated: 2010-11-11Bibliographically approved
List of papers
1. The Magic Bowl: a Tangible User Interface for Configuration of Interactive Environments
Open this publication in new window or tab >>The Magic Bowl: a Tangible User Interface for Configuration of Interactive Environments
2004 (English)In: Proceedings of the 6th International Conference on the Design of Cooperative system (COOP04), 2004Conference paper, Published paper (Refereed)
Abstract [en]

This paper describes our work with the design and deployment of a tangible user interface for controlling an interactive workspace. Our intention was to design a user interface that makes it possible to use the room without focusing on the technology behind. We found that the problems are especially at the beginning of a work session when a group enters a totally shut-down workspace and have to spend valuable time starting and configuring every device before they are able to start working. The Magic Bowl makes it possible to quickly start the interactive workspace with a personalized configuration.

National Category
Telecommunications
Identifiers
urn:nbn:se:kth:diva-26063 (URN)
Conference
6th International Conference on the Design of Cooperative system (COOP04), French Riviera, France, May 2004
Note
QC 20101111Available from: 2010-11-11 Created: 2010-11-11 Last updated: 2012-03-20Bibliographically approved
2. Call establishment delay for secure VoIP
Open this publication in new window or tab >>Call establishment delay for secure VoIP
2004 (English)In: Proceedings of WiOpt '04: Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, 2004Conference paper, Published paper (Refereed)
Abstract [en]

 

 

National Category
Telecommunications
Identifiers
urn:nbn:se:kth:diva-26064 (URN)
Conference
WiOpt'04: Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks 24th - 26th of March, 2004, University of Cambridge, UK
Note
QC 20101111Available from: 2010-11-11 Created: 2010-11-11 Last updated: 2010-11-11Bibliographically approved
3. Secure VoIP: call establishment and media protection
Open this publication in new window or tab >>Secure VoIP: call establishment and media protection
2005 (English)In: Proceedings of 2nd Workshop on Securing Voice over IP, 2005Conference paper, Published paper (Refereed)
Abstract [en]

In this paper we study the possibility of establishing a secure VoIP telephone call using SIP. Different security services relevant for VoIP are presented and we argue that end-to-end authentication and encryption should be provided by default. For media protection we evaluate the possibility of using either SRTP or IPSec, and we examine several alternatives of how a secure VoIP call can be established. The solution we suggest is based on SRTP for media protection, S/MIME and MIKEY for end-to-end authentication and keying, and TLS for hop-by-hop protection of SIP messages. We also present measurements of secure call establishment for MIKEY, SRTP and IPSec using our own SIP user agent (minisip). Our conclusion is that the call establishment delay will not be significantly affected by introducing these security protocols.

National Category
Telecommunications
Identifiers
urn:nbn:se:kth:diva-26065 (URN)
Conference
2nd Workshop on Securing Voice over IP, June 2005, Washington DC, USA
Note
QC 20101111Available from: 2010-11-11 Created: 2010-11-11 Last updated: 2010-11-11Bibliographically approved
4. Secure VoIP performance on handheld devices
Open this publication in new window or tab >>Secure VoIP performance on handheld devices
2006 (English)Report (Other academic)
Place, publisher, year, edition, pages
Stockholm: KTH, 2006
Series
Technical Report TRITA-ICS/ECS R, ISSN 1653-7238 ; 06:03
National Category
Telecommunications
Identifiers
urn:nbn:se:kth:diva-26068 (URN)
Note
QC 20101111Available from: 2010-11-11 Created: 2010-11-11 Last updated: 2010-11-11Bibliographically approved
5. Minisip design overview
Open this publication in new window or tab >>Minisip design overview
2006 (English)Report (Other academic)
Place, publisher, year, edition, pages
Stockholm: KTH, 2006
Series
Technical Report TRITA-ICS/ECS R, ISSN 1653-7238 ; 06:04
National Category
Telecommunications
Identifiers
urn:nbn:se:kth:diva-26070 (URN)
Note
QC 20101111Available from: 2010-11-11 Created: 2010-11-11 Last updated: 2010-11-11Bibliographically approved

Open Access in DiVA

No full text

Search in DiVA

By author/editor
Eliasson, Erik
By organisation
Electronic, Computer and Software Systems, ECS
Telecommunications

Search outside of DiVA

GoogleGoogle Scholar

urn-nbn

Altmetric score

urn-nbn
Total: 417 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf