-
1
-
-
44349133155
-
-
draft-zimmermann-avt-zrtp-09 Internet-Draft, Internet Engineering Task Force, September
-
P. Zimmermann, A. Johnston, and J. Callas, "ZRTP: Media Path Key Agreement for Secure RTP," draft-zimmermann-avt-zrtp-09 (Internet-Draft), Internet Engineering Task Force, September 2008.
-
(2008)
ZRTP: Media Path Key Agreement for Secure RTP
-
-
Zimmermann, P.1
Johnston, A.2
Callas, J.3
-
2
-
-
0017018484
-
New directions in cryptography
-
Nov
-
W. Diffie and M. E. Hellman, "New directions in cryptography," IEEE Transactions on Information Theory, vol. IT-22, no. 6, pp. 644-654, Nov. 1976.
-
(1976)
IEEE Transactions on Information Theory
, vol.IT-22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.E.2
-
4
-
-
33646909480
-
-
RFC 3711 Proposed Standard, Mar, Online, Available
-
M. Baugher, D. McGrew, M. Naslund, E. Carrara, and K. Norrman, "The Secure Real-time Transport Protocol (SRTP)," RFC 3711 (Proposed Standard), Mar. 2004. [Online]. Available: http://www.ietf.org/rfc/rfc3711.txt
-
(2004)
The Secure Real-time Transport Protocol (SRTP)
-
-
Baugher, M.1
McGrew, D.2
Naslund, M.3
Carrara, E.4
Norrman, K.5
-
5
-
-
0034581037
-
Ten risks of PKI: What you're not being told about public-key infrastructure
-
C. Ellison and B. Schneier, "Ten risks of PKI: What you're not being told about public-key infrastructure," Computer Security Journal, vol. 16, no. 1, pp. 1-7, 2000.
-
(2000)
Computer Security Journal
, vol.16
, Issue.1
, pp. 1-7
-
-
Ellison, C.1
Schneier, B.2
-
6
-
-
67649771646
-
RTPSEC Minutes
-
IETF, Prague, Czech Republic, Online, Available
-
IETF, RTPSEC Minutes, Proceedings of the 68th Internet Engineering Task Force, Prague, Czech Republic, 2007. [Online]. Available: http://www.ietf.org/proceedings/07mar/minutes/rtpsec.txt
-
(2007)
Proceedings of the 68th Internet Engineering Task Force
-
-
-
7
-
-
67649757327
-
-
F. Andreasen, M. Baugher, and D. Wing, Session Description Protocol (SDP) Security Descriptions for Media Streams, RFC 4568 (Proposed Standard), Jul. 2006. [Online]. Available: http://www.ietf.org/rfc/rfc4568.txt
-
F. Andreasen, M. Baugher, and D. Wing, "Session Description Protocol (SDP) Security Descriptions for Media Streams," RFC 4568 (Proposed Standard), Jul. 2006. [Online]. Available: http://www.ietf.org/rfc/rfc4568.txt
-
-
-
-
8
-
-
33746205145
-
-
RFC 3830 Proposed Standard, Aug, updated by RFC 4738, Online, Available
-
J. Arkko, E. Carrara, F. Lindholm, M. Naslund, and K. Norrman, "MIKEY: Multimedia Internet KEYing," RFC 3830 (Proposed Standard), Aug. 2004, updated by RFC 4738. [Online]. Available: http://www.ietf.org/rfc/ rfc3830.txt
-
(2004)
MIKEY: Multimedia Internet KEYing
-
-
Arkko, J.1
Carrara, E.2
Lindholm, F.3
Naslund, M.4
Norrman, K.5
-
10
-
-
33746613037
-
-
RFC 4347 Proposed Standard, Apr, Online, Available
-
E. Rescorla and N. Modadugu, "Datagram Transport Layer Security," RFC 4347 (Proposed Standard), Apr. 2006. [Online]. Available: http://www.ietf.org/rfc/rfc4347.txt
-
(2006)
Datagram Transport Layer Security
-
-
Rescorla, E.1
Modadugu, N.2
-
12
-
-
67649771953
-
A man-in-the-middle attack on ZRTP
-
Santander, Spain
-
M. Petraschek, T. Hoeher, O. Jung, H. Hlavacs, and W. Gansterer, "A man-in-the-middle attack on ZRTP," in Workshop on Socio-Economic Issues of NGI, Santander, Spain, 2007.
-
(2007)
Workshop on Socio-Economic Issues of NGI
-
-
Petraschek, M.1
Hoeher, T.2
Jung, O.3
Hlavacs, H.4
Gansterer, W.5
-
13
-
-
0009082080
-
Information Technology Security Techniques Key Management - Part 3: Mechanisms Using Asymmetric Techniques,
-
ISO/IEC 11770-3, International Organization for Standardization, Geneva, Switzerland
-
ISO/IEC 11770-3, Information Technology Security Techniques Key Management - Part 3: Mechanisms Using Asymmetric Techniques, International Organization for Standardization, Geneva, Switzerland, 1999.
-
(1999)
-
-
|