Simulation Protocols Authentication Subscriber in Voice Privacy
Simulasi Protokol Autentikasi Pelanggan pada Voice Privacy
| dc.contributor.advisor | Neyman, Shelvie Nidya | |
| dc.contributor.author | Rizky, Aries Januar | |
| dc.date.accessioned | 2013-03-26T06:57:03Z | |
| dc.date.available | 2013-03-26T06:57:03Z | |
| dc.date.issued | 2010 | |
| dc.identifier.uri | http://repository.ipb.ac.id/handle/123456789/61672 | |
| dc.description.abstract | Existing design of the telephone public network is susceptible to eavesdropping on its voice stream. Consequently, any wire taper can listen to supposedly private conversation. In order to prevent such eavesdropping, we propose a protocols and its implementation for end-to-end voice privacy authenticate as a service available for interested subscribers. Our protocols consist of customer enrollment system, customer authentication system and simulation voice privacy. Protocols that we made are adaptation from Sharif and Wijekesera journal with the title Providing Voice Privacy as a Service over the Public Telephone Network. The result of the process shows how the customer enrolls and how the system process the password, how the system authenticate customer simulate voice privacy. | en |
| dc.subject | Voice privacy | en |
| dc.subject | customer enrollment system | en |
| dc.subject | customer authentication system | en |
| dc.subject | generate password | en |
| dc.subject | simulation voice privacy | en |
| dc.title | Simulation Protocols Authentication Subscriber in Voice Privacy | en |
| dc.title | Simulasi Protokol Autentikasi Pelanggan pada Voice Privacy |
Files in this item
This item appears in the following Collection(s)
-
UT - Computer Science [2482]
