Tschofenig et al., 2009 - Google Patents
Network Working Group D. Wing, Ed. Request for Comments: 5479 Cisco Category: Informational S. Fries Siemens AGTschofenig et al., 2009
View TXT- Document ID
- 2335341507050870793
- Author
- Tschofenig H
- Audet F
- Publication year
External Links
Snippet
Network Working Group D. Wing, Ed. Request for Comments: 5479 Cisco Category:
Informational S. Fries Siemens AG H. Tschofenig Nokia Siemens Networks F. Audet Nortel April
2009 Requirements and Analysis of Media Security Management Protocols Status of This Memo …
- 241001489523 Coregonus artedi 0 title description 3
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. local area networks [LAN], wide area networks [WAN]
- H04L12/2854—Wide area networks, e.g. public data networks
- H04L12/2856—Access arrangements, e.g. Internet access
- H04L12/2869—Operational details of access network equipments
- H04L12/2898—Subscriber equipments
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP1378101B1 (en) | Voip terminal security module, sip stack with security manager, system and security methods | |
US7958233B2 (en) | Method for lawfully intercepting communication IP packets exchanged between terminals | |
Westerlund et al. | Options for securing RTP sessions | |
KR101367038B1 (en) | Efficient key management system and method | |
Fischl et al. | Framework for establishing a secure real-time transport protocol (SRTP) security context using datagram transport layer security (DTLS) | |
Wing et al. | Requirements and analysis of media security management protocols | |
Park | Voice over IP security | |
Palmieri et al. | Providing true end-to-end security in converged voice over IP infrastructures | |
US8924722B2 (en) | Apparatus, method, system and program for secure communication | |
US20080307225A1 (en) | Method For Locking on to Encrypted Communication Connections in a Packet-Oriented Network | |
Bilien | Key Agreement for secure Voice over IP | |
Gurbani et al. | A survey and analysis of media keying techniques in the session initiation protocol (SIP) | |
Floroiu et al. | A comparative analysis of the security aspects of the multimedia key exchange protocols | |
Tschofenig et al. | Network Working Group D. Wing, Ed. Request for Comments: 5479 Cisco Category: Informational S. Fries Siemens AG | |
Fries et al. | RFC 5479: Requirements and Analysis of Media Security Management Protocols | |
Kim et al. | VoIP secure communication protocol satisfying backward compatibility | |
Treßel et al. | A system for secure IP telephone conferences | |
Tao et al. | A lightweight authentication scheme for Session Initiation Protocol | |
Jones et al. | RFC 8871 A Solution Framework for Private Media in Privacy-Enhanced RTP Conferencing (PERC) | |
Wang et al. | A network based authentication scheme for voip | |
Traynor et al. | Vulnerabilities in Voice over IP | |
Alsmairat | Securing SIP in VoIP Domain | |
Aghila et al. | An Analysis of VoIP Secure Key Exchange Protocols Against Man-In-The-Middle Attack | |
Dunte et al. | Secure Voice-over-IP | |
Shekokar et al. | A novel approach to avoid billing attack on VoIP system |