Secure voice

Results: 166



#Item
1

F5 Service Provider Solutions: Optimize, Secure, and Monetize Your Network The environment for communications service providers has never been more challenging. Traditional services such as voice and messaging are in dec

Add to Reading List

Source URL: www.f5.com

    2Cryptography / Cryptographic hash functions / SHA-2 / Twofish / Encryption / Secure voice / Public switched telephone network / Crypt

    GSMK CryptoPhone PSTN/1 Secure PSTN Landline Telephone TECHNICAL SPECIFICATIONS Telephone Line Interface Standard analog PSTN/POTS interface with

    Add to Reading List

    Source URL: www.cryptophone.de

    Language: English - Date: 2009-10-21 09:08:30
    3Cryptography / Secure communication / Key management / Cryptographic software / Data Encryption Standard / Key generation / Key size / Secure voice / Encryption / Twofish / Crypto phone / Index of cryptography articles

    CP-G10i-Flyer-v10.fh-2 [Converted]

    Add to Reading List

    Source URL: www.cryptophone.de

    Language: English - Date: 2010-07-06 09:32:52
    4Security / Prevention / Biometrics / Cybercrime / E-commerce / Secure communication / Speaker recognition / Speech processing / Authentication / Password / Computer security / Transmission Control Protocol

    Voice Authentication Using Short Phrases: Examining Accuracy, Security and Privacy Issues R.C. Johnson, Terrance E. Boult University of Colorado, Colorado Springs Colorado Springs, CO, USA rjohnso9 | tboult

    Add to Reading List

    Source URL: vast.uccs.edu

    Language: English - Date: 2013-12-13 11:59:39
    5Broadband / Telecommunications equipment / Technology / Telephony / Secure communication / Broadband Global Area Network / Thuraya / Inmarsat / Subscriber identity module / Voice over IP / Crypto phone / Wireless LAN

    CP-G10i-Flyer-v10.fh-2 [Converted]

    Add to Reading List

    Source URL: www.cryptophone.de

    Language: English - Date: 2011-02-28 18:04:53
    6Security / E-commerce / Secure communication / Cryptography / Computer security / Heartland Payment Systems / Payment Card Industry Data Security Standard / Data breach / Tokenization

    The Voice of Georgia’s Restaurants Advocacy | Education | Awareness End-to-End Security, Not Just PCI Compliance, Will Keep Your Restaurant Safe 28 Sep:11 AM |Anonymous

    Add to Reading List

    Source URL: www.garestaurants.org

    Language: English - Date: 2015-04-24 14:26:52
    7Videotelephony / Avaya / Unified communications / Business telephone system / Telephony / Voice over IP / Avaya IP Phone 1140E / Avaya Secure Router

    IP Office 500 Overview Avaya IP Office 500 is a highly modular unified communications platform designed to meet the requirements

    Add to Reading List

    Source URL: www.storm-informatika.hr

    Language: English - Date: 2012-12-17 05:18:19
    8Cryptography / Secure communication / Disk encryption / Cryptographic software / Encryption / Data Encryption Standard / Key size / Crypto phone / Secure voice / VeraCrypt / Cryptography standards

    CP-G10i-Flyer-v10.fh-2 [Converted]

    Add to Reading List

    Source URL: www.cryptophone.de

    Language: English - Date: 2010-02-03 15:53:09
    9Payment systems / E-commerce / Electronic funds transfer / Merchant services / Banking in China / China UnionPay / Mobile payment / Debit card / 3-D Secure / Payment processor / EWay / Payment gateway

    AsiaPay Partners with PayEco to Launch PayDollar UnionPay Voice Mobile Payment Solution Service HONG KONG, Jan 30, 2013 /PRNewswire/ -- AsiaPay, the leading ePayment service and solution provider in Asia-Pacific, and Pay

    Add to Reading List

    Source URL: www.asiapay.com

    Language: English - Date: 2013-01-30 06:01:40
    10Wireless networking / Broadband / Local area networks / Network access / Wi-Fi / Wireless LAN / Wireless access point / Internet access / Voice over IP / Internet / Wireless security / Home network

    Client Name: Bicol University and Quirino State College Providing Interconnectivity to Rural Areas through a Cost-Effective, Reliable and Secure Broadband Wireless Access Point Summary One of the Philippine government’

    Add to Reading List

    Source URL: www.asti.dost.gov.ph

    Language: English - Date: 2014-07-22 03:44:07
    UPDATE