ZRTP

Results: 20



#Item
11Password / Cryptographic protocols / Cryptographic nonce / Electronic engineering / Digest access authentication / Computing / Security / ZRTP / Cryptography / Videotelephony / Session Initiation Protocol

Microsoft PowerPoint - VoIP Attack

Add to Reading List

Source URL: powerofcommunity.net

Language: English - Date: 2008-11-05 16:52:50
12Electronics / Videotelephony / Network architecture / Internet protocols / Session Initiation Protocol / ZRTP / Next-generation network / Real-time Transport Protocol / IP Multimedia Subsystem / Computing / Cryptographic protocols / Electronic engineering

Final draft TR/NGCN – Security of session-based communications

Add to Reading List

Source URL: www.ecma-international.org

Language: English - Date: 2014-10-28 04:11:43
13Cryptography / Computing / Cross-platform software / PGP / Email authentication / Email encryption / ZRTP / Tor / Enigmail / Software / Internet privacy / Cryptographic software

Practical Privacy Tools for Everyone @orgshef #privacytools Tails Live OS Demo Public/private key encryption workshop Privacy tools for smartphones

Add to Reading List

Source URL: sheffield.openrightsgroup.org

Language: English - Date: 2014-11-13 15:00:39
14Information / ZRTP / MIKEY / Interlock protocol / Cryptographic protocols / Cryptography / Data

Microsoft Word - paper-strint-johnston.docx

Add to Reading List

Source URL: www.w3.org

Language: English - Date: 2014-02-07 14:41:45
15Computing / ZRTP / Cipher suite / IPsec / Secure Shell / HTTP Secure / Cryptography / Opportunistic encryption / Secure Real-time Transport Protocol / Cryptographic protocols / Data / Information

          Is  Opportunistic  Encryption  the  Answer?  

Add to Reading List

Source URL: www.w3.org

Language: English - Date: 2014-02-07 14:41:45
16Opportunistic encryption / Internet Key Exchange / Perfect forward secrecy / Key-agreement protocol / Security association / ZRTP / X.509 / Public-key cryptography / Domain Name System Security Extensions / Cryptography / Cryptographic protocols / IPsec

Opportunistic Keying as a Countermeasure to Pervasive Monitoring Stephen Kent BBN Technologies Abstract This document was prepared as part of the IETF response to concerns about “pervasive monitoring” (PM) [Farrell-p

Add to Reading List

Source URL: www.w3.org

Language: English - Date: 2014-02-07 14:41:45
17Session Initiation Protocol / SDES / SIP connection / Session border controller / VoIP phone / Back-to-back user agent / Jitsi / ZRTP / SIMPLE / Voice over IP / Videotelephony / Computer-mediated communication

The SSCA® SIP training program Overview The SIP School™ is ‘the’ place to learn all about the Session Initiation Protocol also known as SIP. There is so much information on the internet about SIP that is both hard

Add to Reading List

Source URL: www.thesipschool.com

Language: English - Date: 2014-07-31 06:01:02
18Videotelephony / Cryptographic software / Internet privacy / Skype / Cryptographic protocols / ZRTP / Inter-Asterisk eXchange / Twinkle / Secure Real-time Transport Protocol / Software / Voice over IP / Computing

Contents Skype and the Flux-Capacitor Skype Overview . . . . . . . . . . .

Add to Reading List

Source URL: www.runtux.com

Language: English - Date: 2010-11-10 10:46:37
19Cryptographic software / Cryptographic protocols / Internet privacy / ZRTP / Zfone / Session Initiation Protocol / VoIP phone / Real-time Transport Protocol / PGPfone / Voice over IP / Videotelephony / Computer-mediated communication

Microsoft Word - Sotillo_Samuel[1].doc

Add to Reading List

Source URL: www.infosecwriters.com

Language: English - Date: 2006-06-20 10:25:57
20Session Initiation Protocol / Freeware / VoIP phone / ZRTP / Gizmo5 / Mobile VoIP / VoIP User / Voice over IP / Computer-mediated communication / Videotelephony

IEEE COMMUNICATIONS SURVEYS & TUTORIALS 1

Add to Reading List

Source URL: www.cs.columbia.edu

Language: English - Date: 2011-03-15 00:44:00
UPDATE