Sökning: "key escrow"
Hittade 5 uppsatser innehållade orden key escrow.
1. Securing LBO VoLTE roaming with multiple Escrow Agents : A dynamic approach to distribute cryptographic keys to Escrow Agents
Master-uppsats, KTH/Radio Systems Laboratory (RS Lab)Sammanfattning : The fourth generation cellular mobile broadband, Long-Term Evolution (LTE), provides high speed Internet via Internet Protocol (IP). Today’s wireless infrastructure paves the way to a connected society where high speed Internet is seamlessly available at all times for anyone to use. LÄS MER
2. Multiple Escrow Agents in VoIP
Master-uppsats, KTH/Kommunikationssystem, CoSSammanfattning : Using a Key escrow agent in conjunction with Voice over IP (VoIP) communication ensures that law enforcements agencies (LEAs) can retrieve the session key used to encrypt data between two users in a VoIP session. However, the use of a single escrow agent has some drawbacks. LÄS MER
3. Voice over IP and Lawful Intercept : Good cop/Bad cop
Master-uppsats, KTH/Skolan för informations- och kommunikationsteknik (ICT)Sammanfattning : Lawful interception is a common practice for monitoring a telecommunication network by law enforcement agencies all over the world. It plays a vital role to ensure national security and to control crimes by providing authorized monitoring of communicating parties in a communication network. LÄS MER
4. A Session Initiation Protocol User Agent with Key Escrow
Master-uppsats,Sammanfattning : Voice over Internet Protocol (VoIP), also called IP telephony is rapidly becoming a familiar term and as a technology it is invading the enterprise, private usage, and educational and government organizations. Exploiting advanced voice coding & compression techniques and bandwidth sharing over packet switched networks, VoIP can dramatically improve bandwidth efficiency. LÄS MER
5. Lawful Interception and Countermeasures : In the era of Internet Telephony
Master-uppsats, KTH/Kommunikationssystem, CoSSammanfattning : Lawful interception and the way it is performed have played a significant role in the effectiveness of this type of communication monitoring. Although the secrecy of interception and the related equipment are supposed to provide correct information to a law enforcement agency, there are some countermeasures that can be taken by the subject that can seriously undermine the collection of correct and accurate data. LÄS MER