Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,239,559 papers from all fields of science
Search
Sign In
Create Free Account
Crypto phone
Known as:
Crypto Phones
, Cryptophone
Crypto phones are mobile telephones that provide security against eavesdropping and electronic surveillance. The interception of telecommunications…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
15 relations
Comparison of VoIP software
Cryptographic primitive
Encryption
Hash function
Expand
Broader (1)
Secure communication
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Stethoscope: Crypto Phones with Transparent & Robust Fingerprint Comparisons using Inter Text-Speech Transformations
Maliheh Shirvanian
,
Nitesh Saxena
Conference on Privacy, Security and Trust
2019
Corpus ID: 209900368
Crypto Phones are emerging apps aimed for end-to-end secure communications. To detect man-in-the-middle (MITM) attacks…
Expand
2018
2018
Short voice imitation man-in-the-middle attacks on Crypto Phones: Defeating humans and machines
Maliheh Shirvanian
,
Nitesh Saxena
,
D. Mukhopadhyay
Journal of computing and security
2018
Corpus ID: 4976597
. Establishing secure voice, video and text over Internet (VoIP) communications is a crucial task necessary to prevent…
Expand
2017
2017
CCCP: Closed Caption Crypto Phones to Resist MITM Attacks, Human Errors and Click-Through
Maliheh Shirvanian
,
Nitesh Saxena
Conference on Computer and Communications…
2017
Corpus ID: 23317591
Crypto Phones aim to establish end-to-end secure voice (and text) communications based on human-centric (usually) short checksum…
Expand
2017
2017
CCCP : Closed Caption Crypto Phones to Resist MITM Attacks , Human Errors and Click-Through
Insecure Channel Human Voice Channel
2017
Corpus ID: 29670068
Crypto Phones aim to establish end-to-end secure voice (and text) communications based on human-centric (usually) short checksum…
Expand
2015
2015
On the Security and Usability of Crypto Phones
Maliheh Shirvanian
,
Nitesh Saxena
Asia-Pacific Computer Systems Architecture…
2015
Corpus ID: 11445899
Crypto Phones represent an important approach for end-to-end VoIP security, claiming to prevent "wiretapping" and session…
Expand
Highly Cited
2014
Highly Cited
2014
Wiretapping via Mimicry: Short Voice Imitation Man-in-the-Middle Attacks on Crypto Phones
Maliheh Shirvanian
,
Nitesh Saxena
Conference on Computer and Communications…
2014
Corpus ID: 10687350
Establishing secure voice, video and text over Internet (VoIP) communications is a crucial task necessary to prevent…
Expand
2013
2013
Secure Data and Voice Transmission over GSM Voice Channel: Applications for Secure Communications
Gianluigi Biancucci
,
A. Claudi
,
A. Dragoni
International Symposium on Medical Simulation
2013
Corpus ID: 11140894
The GSM voice channel is the world's most widely used mobile communication network. Unfortunately these networks are affected by…
Expand
2011
2011
Security in the GSM network
Marcin Olawski
2011
Corpus ID: 38969514
The GSM network is the biggest IT network on the Earth. Most of their users are connected to this network 24h a day but not many…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE