![Information / ZRTP / Man-in-the-middle attack / Key-agreement protocol / Public key fingerprint / Secure Real-time Transport Protocol / Authentication / SAS / Secure voice / Cryptographic protocols / Cryptography / Security Information / ZRTP / Man-in-the-middle attack / Key-agreement protocol / Public key fingerprint / Secure Real-time Transport Protocol / Authentication / SAS / Secure voice / Cryptographic protocols / Cryptography / Security](https://www.pdfsearch.io/img/09aef3bf2cac6a2c149584affa927370.jpg)
| Document Date: 2013-05-31 08:50:04 Open Document File Size: 206,94 KBShare Result on Facebook
Company LG / / / IndustryTerm audio fingerprint algorithm / mobile applications / authentication protocol / less manual and simple protocol / secure communications / cellular network / contemporary communication systems / certificate infrastructure / hands-free equipment / / Organization ded / / Person Dominik Schürmann Stephan Sigg / / / Position driver / hB / bit hash hB / / Product Optimus Speed (Optimus 2x) / / Technology Mobile Computing / authentication protocol / cryptography / Secure Real-time Transport Protocol / voice recognition / DESCRIPTION Our protocol / Voice-over-IP / audio fingerprint algorithm / proposed protocol / / URL http /
SocialTag |