| Acronym | Definition |
| 3-DES | Triple Data Encryption Standard |
| 56K | ITU modem standard |
| AEC | Acoustic Echo Cancellation or Canceller |
| AES | Advanced Encryption Standard |
| AGC | Automatic Gain Control |
| ALC | Automatic Level Control |
| APSO | Adaptive Particle Swarm Optimization |
| ATA | Analog Telephone Adapter |
| Bell 212/Bell 103 | ITU/Bell modem standard |
| BSS | Blind Signal Separation |
| Camellia | Block Cipher |
| CASA | Computational Auditory Scene Analysis |
| CAST-128/256 | Block Cipher |
| CCM | Counter with Cipher Block Chaining-Message Authentication Code |
| CCMP | Counter Mode with Cipher Block Chaining Message Authentication Code Protocol |
| CSMA | Carrier Sense Medium Access |
| CSMA/CA | Carrier Sense Medium Access/Collision Avoidance |
| CELP | Code-ExcitationLinear Predictive |
| CMA | Constant modulus algorithm |
| CMS | Cryptographic Message Syntax |
| CNG | Comfort Noise Generation |
| CS | Compressed Sensing |
| CTCSS | Continuous Tone-Code Squelch System |
| CTS | Clear to Send |
| DAA Digital | Analog Analog |
| DCA Dependent | Component Analysis |
| DCF | Distributed Coordination Function |
| DES | Data Encryption Standard |
| DHCP | Dynamic Host Connection Protocol |
| DMD | Digital Micromirror Device |
| DMRC | Distortion Minimizing Rate Control |
| DMS | Defense Messaging System |
| DOA | Direction of Arrival |
| DPI | Deep Packet Inspection |
| DRC | Dynamic Range Compression |
| DSA | Digital Signature Algorithm |
| DSP | Digital Signal Processor |
| DTD | Double Talk Detector |
| DTE | Digital Terminal Equipment |
| DTLS | Datagram Transport Layer Security |
| DTMF | Dual Tone Multi-Frequency |
| DTX | Discontinuous Transmission |
| DUET | Degenerate Unmixing Estimation Technique |
| DWT | Discrete Wavelet Transform |
| EAP | Extensible Authentication Protocol |
| EAPoL | EAP over LAN |
| EAPoW | EAP over Wireless |
| EC | Echo Cancellation |
| ECC | Elliptical Curve Cryptosystem |
| ECDLP | Elliptic Curve Discrete Logarithm Problem |
| ECDSA | Elliptical Curve Digital Signature Algorithm |
| ECM | Error Correction Method |
| EPSO | Euclidian Particle Swarm Optimization |
| FDAF | Frequency Domain Adaptive Filtering |
| FD-GSC | Frequency-Domain Generalized Sidelobe Canceller |
| FEC | Forward Error Correction |
| FM | Frequency Modulation |
| FoIP | Fax over IP |
| FPGA | Field Programmable Gate Array |
| FSK | Frequency Shift Key |
| FTPS | File Transfer Protocol Secure |
| G.165 | ITU Line Echo Canceller |
| G.168 | ITU Line Echo Canceller |
| G.711 | ITU Speech Coder – 64k bps PCM (A-law or μ-law form) |
| G.722 | ITU Speech Coder – 7 kHz audio coding within 64 kbit/s (SB-ADPCM) |
| G.722.1 | ITU Speech Coder – 24k and 32k bps, 7 kHz audio |
| G.722.2 | ITU Speech Coder – Adaptive Multi-Rate Wideband (GSM AMR-WB) |
| G.723.1 | ITU Speech Coder – 5 1/3k and 6.4k bps ACELP/MP-MLQ |
| G.726 | ITU Speech Coder – 16k, 24k, 32k and 40k bps ADPCM |
| G.727 | ITU Speech Coder – 5, 4, 3 and 2-bits sample Embedded ADPCM |
| G.728 | ITU Speech Coder – 16k bps LD-CELP |
| G.729 Annex B | ITU Speech Coder – Silence Detection |
| G.729/G.729A | ITU Speech Coder – 8k bps CS-ACELP |
| GCM | Galois Counter Mode |
| GPSO | Gaussian Particle Swarm Optimization |
| GSM-AMR | GSM Speech Coder – GSM 06.90 Adaptive Multi-Rate Vocoder |
| GSM-AMR-WB | GSM Speech Coder – GSM 06.xx Adaptive Multi-Rate Wideband (ITU G.722.2) |
| GSM-EFR | GSM Speech Coder – GSM 06.60 Enhanced Full Rate Vocoder |
| GSM-FR | GSM Speech Coder – GSM 06.10 Full Rate Vocoder |
| GSM-HR | GSM Speech Coder – GSM 06.20 Half Rate Vocoder |
| H.261 | Video Conference Video Coder Standard |
| H.263 | Video Conference Video Coder Standard |
| H.264 | Video Conference Video Coder Standard |
| HDLC | High level Data Link Control |
| HPBX | Home Private Branch Exchange |
| HTTPS | Hypertext Transfer Protocol Secure |
| ICA | Independent component analysis |
| ICE | Interactive Connectivity Establishment |
| IKEv2 | Internet Key Exchange version 2 |
| iLBC | Internet Low Bitrate Codec |
| IPBX | Internet Protocol Private Branch Exchange |
| IPsec | Secure Internet Protocol |
| JADE | Joint Approximate Diagonalization Eigen-matrices |
| JPEG | Joint Photographic Experts Group |
| JPEG2000 | Joint Photographic Experts Group 2000 |
| JPIP | JPEG200 Interactivity Protocol |
| JPSEC | JPEG 2000 Secure |
| JPWL | JPEG 2000 image coding system: Wireless |
| LANsEND | VOCAL’s network operating system framework |
| LCMV | Linearly-Constrained Minimum-Variance |
| LDPC | Low-Density-Parity-Check Codes Forward Error Correcting algorithm |
| LEC | Line Echo Cancellation or Canceller |
| LI | Lawful Intercept |
| LPC-10 | Linear Predictive Code -10 |
| MAC | Medium Access Control |
| MELP | Mixed-Excitation Linear Predictive |
| MELPe | Mixed-Excitation Linear Predictive Enhanced |
| MIME | Multipurpose Internet Mail Extensions |
| MIMO | Multiple Input Multiple Output |
| MJPEG | Motion JPEG |
| MOS | Mean Opinion Score |
| MOSS | MIME Object Security Services |
| MPEG | Moving Pictures Experts Group |
| MSP | Message Security Protocol |
| NAT | Network Address Translation |
| NBFM | Narrow Band Frequency Modulation |
| NLMS | Normalized Least Mean Squares |
| NNTP | Network News Transfer Protocol |
| NR | Noise reduction |
| NUM | Network Utility Maximization |
| OFDMA | Orthogonal Frequency Division Multiple Access |
| PCA | Principal Components Analysis |
| PCM | Pulse Code Modulation |
| PEM | Privacy Enhanced Mail |
| PFS | Perfect Forward Secrecy |
| PGP | Pretty Good Privacy |
| PLC | Packet Loss Concealment |
| PLD | Programmable Logic Device |
| POTS | Plain Old Telephone System |
| PPPoE | Point to Point Protocol over Ethernet |
| PSK | Phase Shift Key |
| PSO | Particle Swarm Optimization |
| PSQM | Perceptual Speech Quality Measure |
| PSTN | Public System Telephone Network |
| QAM | Quadrature Amplitude Modulation |
| QoS | Quality of Service |
| Rabin | Stream Cipher |
| RASoIP | Remote Access Server over IP |
| RC4 | RSA Encryption Algorithm |
| RDK | Reference Design Kit |
| Reed-Solomon | Reed Solomon Forward Error Correction algorithm |
| R-GSC | Robust Generalized Sidelobe Canceller |
| RoIP | Radio over Internet Protocol (Radio over IP) |
| RSA | RSA Encryption Algorithm |
| RTS | Request to Send |
| S/MIME | Secure / Multipurpose Internet Mail Extensions |
| SASL | Simple Authentication and Security Layer Protocol |
| SDES | Session Description Protocol Security Description for Media Streams |
| Secure ACAP | Secure Application Configuration Access Protocol |
| Secure COMedia | Secure Connection-Oriented Media Transport |
| Secure COPS | Secure Common Open Policy Service |
| Secure IMAP | Secure Internet Message Access Protocol |
| Secure POP | Secure Post Office Protocol |
| Secure SIP | Secure Session Initiation Protocol |
| Secure SMTP | Secure Simple Mail Transfer Protocol |
| SEED | 128 Bit Block Cipher |
| SET | Secure Electronic Transaction |
| SFTP | Secure File Transfer Protocol |
| SHA1 | Secure Hash Encryption algorithm |
| S-HTTP | Secure Hypertext Transfer Protocol |
| SILK | Variable Bitrate Wideband Speech Codec |
| SIP | Session Initiation Protocol |
| SNEWS | Secure Network News Transfer Protocol |
| SNR | Signal-to-Noise Ratio |
| Speex | Wide Band Voice Codec – 8 kHz, 16 kHz, and 32 kHz CELP |
| SR | Stochastic Resonance |
| SRTP | Secure Real-time Transport Protocol |
| SSH | Secure Shell Protocol |
| SSID | Service Set Identification |
| SSLv3/TLSv1 | Secure Sockets Layer/Transport Layer Security |
| STFT | Short-time Fourier Transform |
| STUN | Simple Traversal of UDP Through NAT |
| SVD | Singular value decomposition |
| T.30 | Fax transmission with PSTN Standard |
| T.30-E | Color Fax Standard |
| T.38 | Fax over IP Standard |
| TD-GSC | Time Domain Generalized Sidelobe Canceller |
| TDMA | Time Division Multiple Access |
| TDOA | Time Delay of Arrival |
| TOA | Time of Arrival |
| TR-69 | CPE WAN Management Protocol (CWMP) |
| Trellis | Error Correction Algorithm |
| TLS | Transport Layer Security |
| TSN | Transitional Security Network |
| Turbo | Turbo Codes Forward Error Correcting (FEC) algorithm |
| TURN | Traversal Using Relay NAT |
| UWB | Ultra Wide Band |
| V.17 | ITU modem standard |
| V.21 ch2 | ITU modem standard |
| V.22bis/V.22 | ITU modem standard |
| V.23/V.21 | ITU modem standard |
| V.27ter | ITU modem standard |
| V.29 | ITU modem standard |
| V.32bis/V.32 | ITU modem standard |
| V.34 | ITU modem standard |
| V.34fax | ITU modem standard |
| V.42 | ITU modem standard |
| V.42bis | ITU modem standard |
| V.44 | ITU modem standard |
| V.90 | ITU modem standard |
| V.92 | ITU modem standard |
| V2oIP | Voice and Video over Internet Protocol |
| VAD | Voice Activity Detection |
| VOX | Voice Activated Transmission |
| VPBX | Video Private Branch Exchange |
| VQE | Voice Quality Enhancement; aka speech enhancement |
| WEP | Wired Equivalent Privacy |
| WiMAX Security | DES-CBC encryption/authentication and PKM |
| WMSN | Wireless Multimedia Sensor Network |
| WPA | Wi-Fi Protected Access |
| WRAP | Wireless Robust Authentication Protocol |
| WTLS | Wireless Transport Layer Security |
| XMPP | Extensible Messaging and Presence Protocol |
| XTLS | Extensible Transport Layer Security |