메뉴 건너뛰기




Volumn , Issue , 2008, Pages

Using SIP identity to prevent man-in-the-middle attacks on ZRTP

Author keywords

[No Author keywords available]

Indexed keywords

KEY AGREEMENT PROTOCOL; KEY EXCHANGE; KEY EXCHANGE MECHANISM; MAN IN THE MIDDLE ATTACKS; MEDIA STREAMS; PUBLIC-KEY INFRASTRUCTURE; SESSION KEY;

EID: 67649817560     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/WD.2008.4812920     Document Type: Conference Paper
Times cited : (4)

References (13)
  • 5
    • 0034581037 scopus 로고    scopus 로고
    • Ten risks of PKI: What you're not being told about public-key infrastructure
    • C. Ellison and B. Schneier, "Ten risks of PKI: What you're not being told about public-key infrastructure," Computer Security Journal, vol. 16, no. 1, pp. 1-7, 2000.
    • (2000) Computer Security Journal , vol.16 , Issue.1 , pp. 1-7
    • Ellison, C.1    Schneier, B.2
  • 6
    • 67649771646 scopus 로고    scopus 로고
    • RTPSEC Minutes
    • IETF, Prague, Czech Republic, Online, Available
    • IETF, RTPSEC Minutes, Proceedings of the 68th Internet Engineering Task Force, Prague, Czech Republic, 2007. [Online]. Available: http://www.ietf.org/proceedings/07mar/minutes/rtpsec.txt
    • (2007) Proceedings of the 68th Internet Engineering Task Force
  • 7
    • 67649757327 scopus 로고    scopus 로고
    • F. Andreasen, M. Baugher, and D. Wing, Session Description Protocol (SDP) Security Descriptions for Media Streams, RFC 4568 (Proposed Standard), Jul. 2006. [Online]. Available: http://www.ietf.org/rfc/rfc4568.txt
    • F. Andreasen, M. Baugher, and D. Wing, "Session Description Protocol (SDP) Security Descriptions for Media Streams," RFC 4568 (Proposed Standard), Jul. 2006. [Online]. Available: http://www.ietf.org/rfc/rfc4568.txt
  • 10
    • 33746613037 scopus 로고    scopus 로고
    • RFC 4347 Proposed Standard, Apr, Online, Available
    • E. Rescorla and N. Modadugu, "Datagram Transport Layer Security," RFC 4347 (Proposed Standard), Apr. 2006. [Online]. Available: http://www.ietf.org/rfc/rfc4347.txt
    • (2006) Datagram Transport Layer Security
    • Rescorla, E.1    Modadugu, N.2
  • 13
    • 0009082080 scopus 로고    scopus 로고
    • Information Technology Security Techniques Key Management - Part 3: Mechanisms Using Asymmetric Techniques,
    • ISO/IEC 11770-3, International Organization for Standardization, Geneva, Switzerland
    • ISO/IEC 11770-3, Information Technology Security Techniques Key Management - Part 3: Mechanisms Using Asymmetric Techniques, International Organization for Standardization, Geneva, Switzerland, 1999.
    • (1999)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.