Design a Mechanisms to Protect Voice over IP systems with Identity Based Technologies
$30-1000 USD
已关闭
已发布大约 18 年前
$30-1000 USD
货到付款
This project’s aim is to
-identify the challenges in the current VoIP standards such as SIP and show how to secure them. All challenges will be investigated and summed up in the first 2 months of the dissertation
-integrate the IDAK protocol into the current IETF VoIP standard. (i.e. SIP)
investigating challenges in VoIP Standards, the current standard will be investigated further so that the newly proposed identity based cryptography technique can be integrated into the new draft
-then we will draft standards for SIP using identity based techniques
In this period an actual standards proposal, integrating identity based cryptography technique, will be drafted and proposed.
-Write final report
## Deliverables
1) Complete and fully-functional working program(s) in executable form as well as complete source code of all work done.
2) Deliverables must be in ready-to-run condition, as follows (depending on the nature of the deliverables):
a) For web sites or other server-side deliverables intended to only ever exist in one place in the Buyer's environment--Deliverables must be installed by the Seller in ready-to-run condition in the Buyer's environment.
b) For all others including desktop software or software the buyer intends to distribute: A software installation package that will install the software in ready-to-run condition on the platform(s) specified in this bid request.
3) All deliverables will be considered "work made for hire" under U.S. Copyright law. Buyer will receive exclusive and complete copyrights to all work purchased. (No GPL, GNU, 3rd party components, etc. unless all copyright ramifications are explained AND AGREED TO by the buyer on the site per the coder's Seller Legal Agreement).
## Platform
VOIP