Back to Results
First PageMeta Content
Data / ZRTP / Secure Real-time Transport Protocol / MIKEY / SDES / Public-key cryptography / Session Initiation Protocol / SIP connection / Session border controller / Cryptographic protocols / Cryptography / Voice over IP


Security Analysis of Voice-over-IP Protocols Prateek Gupta VMWare, Inc. Vitaly Shmatikov The University of Texas at Austin
Add to Reading List

Document Date: 2007-06-30 16:56:07


Open Document

File Size: 197,24 KB

Share Result on Facebook

Company

Skype / The AES / Ingate Systems / /

/

Event

Person Communication and Meetings / FDA Phase / /

Facility

Inc. Vitaly Shmatikov The University of Texas / /

IndustryTerm

transport-layer protocol / applicationlayer signaling protocol / media streams / Session description protocols / users/services / protocol / telephony / transport layer protocol / media-level descriptions / formal analysis tool / transport layer security protocols / automatic key management / public key algorithms / insecure public networks / publickey infrastructure / even accounting / eyeBeam software / secure media / message authentication algorithms / wireless packets / trusted certificate server / security protocols / Internet KEYing / voice communications / media encryption / public-key infrastructure / protocols / assumptions about another protocol / secure key exchange protocol / intermediate proxy server / software modems / proxy server / phone devices / communication network / location server / transport-layer security protocols / /

Movie

D. 3 / /

NaturalFeature

Media Streams / /

Organization

University of Texas at Austin / SIP URI / Maximum Transmission Unit / SRTP VoIP / SDP Session Description Protocol / /

Person

Bob Attacker / Alice / /

/

Position

randomness extractor / registrar / /

Product

Realtime Transport Protocol / High Level / SRTP / /

ProgrammingLanguage

K / /

ProvinceOrState

Texas / /

Technology

Signaling protocols / spoofed Router / public key algorithms / key exchange protocol / transport-layer encryption / PKI / peer-to-peer protocol / separate protocol / block cipher / Session description protocols / transport-layer security protocols / ZRTP key exchange protocol / Voice-over-IP protocol / security protocols / 130.212 2 Protocols / datagram encryption / MGCP / Maximum Transmission Unit / well-designed protocol / encryption / transport layer protocol / Uniform Resource Identifier / SDP protocol / transport-layer SRTP protocol / VoIP protocols / applicationlayer signaling protocol / two VoIP protocols / PBX / media encryption / VoIP protocol / GUI / S/MIME / stream cipher-like encryption / message authentication algorithms / Key exchange protocols / data encryption / MTU / UDP / cryptographically secure key exchange protocol / public-key infrastructure / ZRTP protocol / SRTP encryption / VoIP security protocols / public key / DNS / Proxy Server / transport-layer protocol / BYE Alice@128.83.130.212 BYE Alice@128.83.130.212 Session Initiation Protocol / transport layer security protocols / HTTP / H.323 / Voice-over-IP / VOIP / stream cipher / /

SocialTag