-
1
-
-
67649680302
-
PKI: ten years later
-
[accessed 15.08.08]
-
Adams C., and Just M. PKI: ten years later. Proceedings 3rd annual PKI R&D workshop (2004). http://middleware.internet2.edu/pki04/proceedings/pki_ten_years.pdf [accessed 15.08.08]
-
(2004)
Proceedings 3rd annual PKI R&D workshop
-
-
Adams, C.1
Just, M.2
-
2
-
-
28844464288
-
Internet low bit rate codec (iLBC)
-
Andersen S., Duric A., Astrom H., Hagen R., Kleijn W., and Linden J. Internet low bit rate codec (iLBC). IETF RFC 3951 (2004)
-
(2004)
IETF RFC 3951
-
-
Andersen, S.1
Duric, A.2
Astrom, H.3
Hagen, R.4
Kleijn, W.5
Linden, J.6
-
5
-
-
33646917974
-
Real-time transport protocol (RTP) payload format for Internet low bit rate codec (iLBC) speech
-
Duric A., and Andersen S. Real-time transport protocol (RTP) payload format for Internet low bit rate codec (iLBC) speech. IETF RFC 3952 (2004)
-
(2004)
IETF RFC 3952
-
-
Duric, A.1
Andersen, S.2
-
6
-
-
67649753279
-
-
Fischer K. End-to-End security for DTLS-SRTP. IETF DRAFT , 2008.
-
Fischer K. End-to-End security for DTLS-SRTP. IETF DRAFT , 2008.
-
-
-
-
7
-
-
67649691946
-
Framework for establishing an SRTP security context using DTLS
-
Fischl J, Tschofenig H, Rescorla E. Framework for establishing an SRTP security context using DTLS. IETF DRAFT , 2008.
-
(2008)
IETF DRAFT
-
-
Fischl, J.1
Tschofenig, H.2
Rescorla, E.3
-
8
-
-
4043169008
-
Security multiparts for mime: multipart/signed and multipart/encrypted
-
Galvin J., Murphy S., Crocker S., and Freed N. Security multiparts for mime: multipart/signed and multipart/encrypted. IETF RFC 1847 (1995)
-
(1995)
IETF RFC 1847
-
-
Galvin, J.1
Murphy, S.2
Crocker, S.3
Freed, N.4
-
9
-
-
0036697706
-
New voice over internet protocol technique with hierarchical data security protection
-
Guo JI, Yen JC, Pai HF, New voice over internet protocol technique with hierarchical data security protection. In: IEE Proceedings vision, image & signal processing, vol. 149, no. 4; 2002. p. 237-43.
-
(2002)
IEE Proceedings vision, image & signal processing
, vol.149
, Issue.4
, pp. 237-243
-
-
Guo, J.I.1
Yen, J.C.2
Pai, H.F.3
-
11
-
-
0003308762
-
Internet X.509 public key infrastructure certificate and CRL profile
-
Housley R., Ford W., Polk W., and Solo D. Internet X.509 public key infrastructure certificate and CRL profile. IETF RFC 2459 (1999)
-
(1999)
IETF RFC 2459
-
-
Housley, R.1
Ford, W.2
Polk, W.3
Solo, D.4
-
12
-
-
67649747244
-
-
ITU-T. Coding of speech at 8 Kbit/s using conjugate-structure algebraic-code-excited linear prediction (CS-ACELP). ITU-T Recommendation G.729; 1996.
-
ITU-T. Coding of speech at 8 Kbit/s using conjugate-structure algebraic-code-excited linear prediction (CS-ACELP). ITU-T Recommendation G.729; 1996.
-
-
-
-
13
-
-
67649727350
-
-
Itu-T. Mean opinion score (MOS). ITU-T recommendation P800; 1996.
-
Itu-T. Mean opinion score (MOS). ITU-T recommendation P800; 1996.
-
-
-
-
14
-
-
67649753278
-
-
Itu-T. Provisional planning values for the equipment impairment factor Ie and packet-loss robustness factor Bpl. ITU-T Recommendation G.113 appendix I; 2002.
-
Itu-T. Provisional planning values for the equipment impairment factor Ie and packet-loss robustness factor Bpl. ITU-T Recommendation G.113 appendix I; 2002.
-
-
-
-
15
-
-
67649706277
-
-
Itu-T. Packet based multimedia communication systems. ITU-T Recommendation H.323; 2003.
-
Itu-T. Packet based multimedia communication systems. ITU-T Recommendation H.323; 2003.
-
-
-
-
16
-
-
0347692679
-
Performance analysis of AES candidates on the 6805 CPU core
-
NIST
-
Keating G. Performance analysis of AES candidates on the 6805 CPU core. Second AES candidate conference (1999), NIST
-
(1999)
Second AES candidate conference
-
-
Keating, G.1
-
17
-
-
0003068282
-
Security architecture for the Internet protocol
-
Kent S., and Atkinson R. Security architecture for the Internet protocol. IETF RFC 2401 (1998)
-
(1998)
IETF RFC 2401
-
-
Kent, S.1
Atkinson, R.2
-
20
-
-
35048827209
-
New techniques for assessing audio and video quality in real-time interactive communications
-
Mullin J, Smallwood L, Watson A, Wilson G, New techniques for assessing audio and video quality in real-time interactive communications. IHM-HCI Tutorial; 2001.
-
(2001)
IHM-HCI Tutorial
-
-
Mullin, J.1
Smallwood, L.2
Watson, A.3
Wilson, G.4
-
22
-
-
0033314753
-
An overview of PKI trust models
-
Perlman R. An overview of PKI trust models. IEEE Network 13 6 (1999)
-
(1999)
IEEE Network
, vol.13
, Issue.6
-
-
Perlman, R.1
-
23
-
-
67649676470
-
Enhancements for authenticated identity management in the Session Initiation Protocol (SIP)
-
Peterson J., and Jennings C. Enhancements for authenticated identity management in the Session Initiation Protocol (SIP). IETF RFC 4474 (2006)
-
(2006)
IETF RFC 4474
-
-
Peterson, J.1
Jennings, C.2
-
25
-
-
0003367568
-
S/MIME version 3 message specification
-
Ramsdell B. S/MIME version 3 message specification. IETF RFC 2633 (1999)
-
(1999)
IETF RFC
, vol.2633
-
-
Ramsdell, B.1
-
27
-
-
0003240332
-
SIP: session initiation protocol
-
Rosenberg J., Schulzrinne H., Camarillo G., Johnston A., Peterson J., and Sparks R. SIP: session initiation protocol. IETF RFC 3261 (2002)
-
(2002)
IETF RFC 3261
-
-
Rosenberg, J.1
Schulzrinne, H.2
Camarillo, G.3
Johnston, A.4
Peterson, J.5
Sparks, R.6
-
29
-
-
0003412071
-
-
[accessed 15.09.07]
-
Schneier B., Kelsey J., Whiting D., Wagner D., Hall C., and Ferguson N. Twofish: a 128 bit block cipher (1998). http://www.counterpane.com/twofish.html [accessed 15.09.07]
-
(1998)
Twofish: a 128 bit block cipher
-
-
Schneier, B.1
Kelsey, J.2
Whiting, D.3
Wagner, D.4
Hall, C.5
Ferguson, N.6
-
30
-
-
67649706269
-
-
[accessed 15.09.07]
-
Shneier B. TwoFish source code (2007). http://www.schneier.com/twofish-download.html [accessed 15.09.07]
-
(2007)
TwoFish source code
-
-
Shneier, B.1
-
33
-
-
67649691936
-
-
[accessed 15.02.08]
-
Valin J.M. Speex (2008). http://people.xiph.org/%7Ejm/papers/aes120_speex_vorbis.pdf [accessed 15.02.08]
-
(2008)
Speex
-
-
Valin, J.M.1
-
37
-
-
67649676461
-
-
Zimmermann P, Media path key agreement for secure RTP. IETF Draft , 2009.
-
Zimmermann P, Media path key agreement for secure RTP. IETF Draft , 2009.
-
-
-
|