<--- Back to Details
First PageDocument Content
Data / ZRTP / Secure Real-time Transport Protocol / MIKEY / SDES / Public-key cryptography / Session Initiation Protocol / SIP connection / Session border controller / Cryptographic protocols / Cryptography / Voice over IP
Date: 2007-06-30 16:56:07
Data
ZRTP
Secure Real-time Transport Protocol
MIKEY
SDES
Public-key cryptography
Session Initiation Protocol
SIP connection
Session border controller
Cryptographic protocols
Cryptography
Voice over IP

Security Analysis of Voice-over-IP Protocols Prateek Gupta VMWare, Inc. Vitaly Shmatikov The University of Texas at Austin

Add to Reading List

Source URL: www.cyber-ta.org

Download Document from Source Website

File Size: 197,24 KB

Share Document on Facebook

Similar Documents

Microsoft Word - VigorPhone 350 V12202release note.doc

Microsoft Word - VigorPhone 350 V12202release note.doc

DocID: 1gwZt - View Document

EdgeProtectâ„¢ 7000 Series Secure, high-quality, real-time voice and video communications. Scalable, single-box solution for small, medium and large enterprise. Supports mobile users and provides demarcation point for IP

EdgeProtectâ„¢ 7000 Series Secure, high-quality, real-time voice and video communications. Scalable, single-box solution for small, medium and large enterprise. Supports mobile users and provides demarcation point for IP

DocID: 1fI1h - View Document

Optimum_Logos_Knockout_CMYK_Yellow

Optimum_Logos_Knockout_CMYK_Yellow

DocID: 1aLTZ - View Document

Security Analysis of Voice-over-IP Protocols Prateek Gupta VMWare, Inc. Vitaly Shmatikov The University of Texas at Austin

Security Analysis of Voice-over-IP Protocols Prateek Gupta VMWare, Inc. Vitaly Shmatikov The University of Texas at Austin

DocID: 1aFsQ - View Document

White Paper Voice over Internet Protocol (VoIP). Optimizing business processes using modern communication.

White Paper Voice over Internet Protocol (VoIP). Optimizing business processes using modern communication.

DocID: 1ad6x - View Document