Academic literature on the topic 'Secure Real-Time Protocol (SRTP'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Secure Real-Time Protocol (SRTP.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Secure Real-Time Protocol (SRTP"
H.G., Shashidhar, Sanket Dessai, and Shilpa Chaudhari. "Design of Secure Transmission of Multimedia Data Using SRTP on Linux Platform." International Journal of Reconfigurable and Embedded Systems (IJRES) 4, no. 2 (July 1, 2015): 71. http://dx.doi.org/10.11591/ijres.v4.i2.pp71-81.
Full textPrastiawan, Hendra. "Analisa Kinerja VoIP Client dengan Menggunakan Modul RTP Terenkripsi dan SRTP pada Jaringan VoIP." Jurnal Telekomunikasi dan Komputer 5, no. 3 (February 27, 2017): 205. http://dx.doi.org/10.22441/incomtech.v5i3.1141.
Full textLiu, Chun, and Kun Tan. "Research and Implementation of the Secure Database-Update Mechanism." Applied Mechanics and Materials 513-517 (February 2014): 1752–55. http://dx.doi.org/10.4028/www.scientific.net/amm.513-517.1752.
Full textYingyuan, Xiao, Liu Yunsheng, and Chen Xiangyang. "An efficient secure real-time concurrency control protocol." Wuhan University Journal of Natural Sciences 11, no. 6 (November 2006): 1899–902. http://dx.doi.org/10.1007/bf02831902.
Full textLee, Sungyoung, Byeong-Soo Jeong, and Hyon-Woo Seung. "A secure dynamic copy protocol in real-time secure database systems." ACM SIGPLAN Notices 34, no. 7 (July 1999): 73–79. http://dx.doi.org/10.1145/315253.314452.
Full textAlMahmoud, Abdelrahman, Maurizio Colombo, Chan Yeob Yeun, and Hassan Al Muhairi. "Secure communication protocol for real-time business process monitoring." International Journal of Internet Technology and Secured Transactions 5, no. 3 (2014): 223. http://dx.doi.org/10.1504/ijitst.2014.065183.
Full textChanjung Park, Seog Park, and S. H. Son. "Multiversion locking protocol with freezing for secure real-time database systems." IEEE Transactions on Knowledge and Data Engineering 14, no. 5 (September 2002): 1141–54. http://dx.doi.org/10.1109/tkde.2002.1033780.
Full textDivya, K., and B. Srinivasan. "Trust Based Secure Multipath Routing Protocol for MANET." International Journal of Computer Science and Mobile Computing 10, no. 5 (May 30, 2021): 72–80. http://dx.doi.org/10.47760/ijcsmc.2021.v10i05.008.
Full textAhmed, Adel Ali, and Norsheila Fisal Fisal. "Secure real-time routing protocol with load distribution in wireless sensor networks." Security and Communication Networks 4, no. 8 (May 25, 2010): 839–69. http://dx.doi.org/10.1002/sec.214.
Full textKim, Namgyu, Songchun Moon, and Yonglak Sohn. "Secure one snapshot protocol for concurrency control in real-time stock trading systems." Journal of Systems and Software 73, no. 3 (November 2004): 441–54. http://dx.doi.org/10.1016/j.jss.2003.08.236.
Full textDissertations / Theses on the topic "Secure Real-Time Protocol (SRTP"
Abad, Caballero Israel Manuel. "Secure Mobile Voice over IP." Thesis, KTH, Mikroelektronik och Informationsteknik, IMIT, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-93113.
Full textVoice over IP (VoIP) kan defineras som förmågan att göra ett telefonsamtal och att skicka fax (eller att göraallting som man idag kan göra över det publika telefonnätet) över ett IP−baserat nätverk med en passande kvalitet och till lägre kostnad, alternativt större nytta. VoIP måste tillhandahållas med nödvändiga säkerhetstjänster utan att teknikens prestanta påverkas. Detta blir allt viktigare när VoIP används över trådlösa länktekniker (såsom trådlösa lokala nätverk, WLAN), givet dessa länkars begränsade bandbredd och den bearbetningkraft som krävs för att exekvera säkerhetsmekanismerna. Vi måste tänka på VoIPs säkerhet likt en kedja där inte någon länk, från säker uppkoppling till säker nedkoppling, får fallera för att erhålla en säker process. I detta dokument presenteras en lösning på detta problem och innefattar en säker modell för Mobile VoIP som minimerar bearbetningskostnaderna och bandbreddsutnyttjandet. Detta erhålls huvudsakligen genom utnyttjande av säkerhetsprotokoll med hög genomströmning och låg paketexpansion, såsom "Secure Real− time Protocol" (SRTP), och av krypteringsprotokoll med hög hastighet, såsom "Advanced Encryption Standard" (AES). I detta dokument beskriver jag problemet och dess alternativa lösningar. Jag beskriver också den valda lösningen och dess protokoll och mekanismer mer detaljerat, till exempel "Transport Layer Security" (TLS) för att säkra "Session Initiation Protocol" (SIP), SRTP för att skydda transporten av data och "Multimedia Internet KEYing" (MIKEY) för nyckelhantering. En implementation av SRTP, kallad MINIsrtp, finns också beskriven. Beträffande praktiskt arbete och tester av lösningsmodellen har detta projekt fokuserats på skyddandet av datatransporten (SRTP), dess implementation och prestanda. Emellertid har en grundlig teoretisk undersökning genomförts, vilken innefattar andra aspekter såsom telefonsamtalets uppkoppling och nedkoppling (med hjälp av SIP) och valet av passande nyckelhanteringsprotokoll (MIKEY) för att stödja SRTP.
Mohanty, Saswat. "Using Secure Real-time Padding Protocol to Secure Voice-over-IP from Traffic Analysis Attacks." Thesis, 2011. http://hdl.handle.net/1969.1/ETD-TAMU-2011-05-9116.
Full textRavi, Niranjan. "Integration of UAVS with Real Time Operating Systems and Establishing a Secure Data Transmission." Thesis, 2019. http://hdl.handle.net/1805/19920.
Full textIn today’s world, the applications of Unmanned Aerial Vehicle (UAV) systems are leaping by extending their scope from military applications on to commercial and medical sectors as well. Owing to this commercialization, the need to append external hardware with UAV systems becomes inevitable. This external hardware could aid in enabling wireless data transfer between the UAV system and remote Wireless Sensor Networks (WSN) using low powered architecture like Thread, BLE (Bluetooth Low Energy). The data is being transmitted from the flight controller to the ground control station using a MAVlink (Micro Air Vehicle Link) protocol. But this radio transmission method is not secure, which may lead to data leakage problems. The ideal aim of this research is to address the issues of integrating different hardware with the flight controller of the UAV system using a light-weight protocol called UAVCAN (Unmanned Aerial Vehicle Controller Area Network). This would result in reduced wiring and would harness the problem of integrating multiple systems to UAV. At the same time, data security is addressed by deploying an encryption chip into the UAV system to encrypt the data transfer using ECC (Elliptic curve cryptography) and transmitting it to cloud platforms instead of radio transmission.
(7013471), NIRANJAN RAVI. "Integration of UAVS with Real Time Operating Systems and Establishing a Secure Data Transmission." Thesis, 2019.
Find full textBook chapters on the topic "Secure Real-Time Protocol (SRTP"
Oryńczak, Grzegorz, and Zbigniew Kotulski. "Context-Aware Secure Routing Protocol for Real-Time Services." In Communications in Computer and Information Science, 193–207. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-662-44893-9_17.
Full textMukkamala, Ravi, and Sang H. Son. "A secure concurrency control protocol for real-time databases." In IFIP Advances in Information and Communication Technology, 215–30. Boston, MA: Springer US, 1996. http://dx.doi.org/10.1007/978-0-387-34932-9_14.
Full textPark, C., S. Park, and S. Son. "Priority-driven secure multiversion locking protocol for real-time secure database systems." In Database Security XI, 229–44. Boston, MA: Springer US, 1998. http://dx.doi.org/10.1007/978-0-387-35285-5_14.
Full textShemaili, Mouza Ahmed Bani, Chan Yeob Yeun, Mohamed Jamal Zemerly, Khalid Mubarak, Hyun Ku Yeun, Yoon Seok Chang, Basim Zafar, Mohammed Simsim, Yasir Salih, and Gaemyoung Lee. "A New Lightweight Mutual Authentication Protocol to Secure Real Time Tracking of Radioactive Sources." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 231–46. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-90775-8_19.
Full textKaddar, Lamia. "Incorporating Security and Energy Efficiency for Multimedia Communications in WANets." In Technological Advancements and Applications in Mobile Ad-Hoc Networks, 228–46. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-4666-0321-9.ch014.
Full textOehler, Michael. "Securing Multimedia and VoIP Content with the Secure Real-Time Transport Protocol." In Security in Distributed and Networking Systems, 55–72. WORLD SCIENTIFIC, 2007. http://dx.doi.org/10.1142/9789812770103_0003.
Full textCiszkowski, Tomasz, and Zbigniew Kotulski. "Secure Routing with Reputation in MANET." In Handbook of Research on Wireless Security, 449–60. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-899-4.ch028.
Full textChandrakar, Preeti. "A Secure Remote User Authentication Protocol for Healthcare Monitoring Using Wireless Medical Sensor Networks." In Research Anthology on Telemedicine Efficacy, Adoption, and Impact on Healthcare Delivery, 549–72. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-8052-3.ch029.
Full textAugusto, Alexandre B., and Manuel E. Correia. "A Secure and Dynamic Mobile Identity Wallet Authorization Architecture Based on a XMPP Messaging Infrastructure." In Innovations in XML Applications and Metadata Management, 21–37. IGI Global, 2013. http://dx.doi.org/10.4018/978-1-4666-2669-0.ch002.
Full textSarella, Venkata Ramana, Deshai Nakka, Sekhar B. V. D. S., Krishna Rao Sala, and Sameer Chakravarthy V. V. S. S. "An Experimental Analysis of Modified EEECARP." In Advances in Library and Information Science, 318–36. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-1786-4.ch012.
Full textConference papers on the topic "Secure Real-Time Protocol (SRTP"
Alexander, Andre L., Alexander L. Wijesinha, and Ramesh Karne. "An Evaluation of Secure Real-Time Transport Protocol (SRTP) Performance for VoIP." In 2009 Third International Conference on Network and System Security. IEEE, 2009. http://dx.doi.org/10.1109/nss.2009.90.
Full textMohammed, Mazen Tawfik, Alaa Eldin Rohiem, and Ali El-moghazy. "Confidentiality enhancement of Secure Real Time Transport Protocol." In 2012 8th International Computer Engineering Conference (ICENCO). IEEE, 2012. http://dx.doi.org/10.1109/icenco.2012.6487088.
Full textLee, Sungyoung, Byeong-Soo Jeong, and Hyon-Woo Seung. "A secure dynamic copy protocol in real-time secure database systems." In the ACM SIGPLAN 1999 workshop. New York, New York, USA: ACM Press, 1999. http://dx.doi.org/10.1145/314403.314452.
Full textSeftyanto, Donny, and Yusuf Kurniawan. "Key management analysis of secure real time protocol version 2." In 2017 International Conference on Information Technology Systems and Innovation (ICITSI). IEEE, 2017. http://dx.doi.org/10.1109/icitsi.2017.8267955.
Full textSen, Nilanjan, Ram Dantu, and Mark Thompson. "Performance Analysis of Secure Real-time Transport Protocol Using Elliptic Curves." In 2020 IEEE International Conference on Intelligence and Security Informatics (ISI). IEEE, 2020. http://dx.doi.org/10.1109/isi49825.2020.9280526.
Full textRabee, Furkan, Yong Liao, and Maolin Yang. "Minimizing Multiple-Priority Inversion Protocol in Hard Real Time System." In 2013 IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC). IEEE, 2013. http://dx.doi.org/10.1109/dasc.2013.62.
Full textLiao, Cheng-Fu, Yung-Feng Lu, Ai-Chun Pang, and Tei-Wei Kuo. "A Secure Routing Protocol for Wireless Embedded Networks." In 2008 14th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA). IEEE, 2008. http://dx.doi.org/10.1109/rtcsa.2008.40.
Full textDermanilian, Hoseb M., and Imad H. Elhajj. "Evaluating Secure Real-Time Transport Protocol performance on power constrained handheld devices." In 2010 International Conference on Energy Aware Computing (ICEAC). IEEE, 2010. http://dx.doi.org/10.1109/iceac.2010.5702299.
Full textMurtaza, Abid, and Liu Jianwei. "A simple, secure and efficient authentication protocol for real-time earth observation through satellite." In 2018 15th International Bhurban Conference on Applied Sciences and Technology (IBCAST). IEEE, 2018. http://dx.doi.org/10.1109/ibcast.2018.8312319.
Full textAlshowkan, Muneer, Khaled Elleithy, and Hussain Alhassan. "LS-LEACH: A New Secure and Energy Efficient Routing Protocol for Wireless Sensor Networks." In 2013 IEEE/ACM 17th International Symposium on Distributed Simulation and Real Time Applications (DS-RT). IEEE, 2013. http://dx.doi.org/10.1109/ds-rt.2013.31.
Full textReports on the topic "Secure Real-Time Protocol (SRTP"
Baugher, M., D. McGrew, M. Naslund, E. Carrara, and K. Norrman. The Secure Real-time Transport Protocol (SRTP). RFC Editor, March 2004. http://dx.doi.org/10.17487/rfc3711.
Full textJennings, C., P. Jones, R. Barnes, and A. B. Roach. Double Encryption Procedures for the Secure Real-Time Transport Protocol (SRTP). RFC Editor, April 2020. http://dx.doi.org/10.17487/rfc8723.
Full textLennox, J. Encryption of Header Extensions in the Secure Real-time Transport Protocol (SRTP). RFC Editor, April 2013. http://dx.doi.org/10.17487/rfc6904.
Full textMcGrew, D., and K. Igoe. AES-GCM Authenticated Encryption in the Secure Real-time Transport Protocol (SRTP). RFC Editor, December 2015. http://dx.doi.org/10.17487/rfc7714.
Full textLehtovirta, V., M. Naslund, and K. Norrman. Integrity Transform Carrying Roll-Over Counter for the Secure Real-time Transport Protocol (SRTP). RFC Editor, January 2007. http://dx.doi.org/10.17487/rfc4771.
Full textKim, W., J. Lee, J. Park, D. Kwon, and D. Kim. The ARIA Algorithm and Its Use with the Secure Real-Time Transport Protocol (SRTP). RFC Editor, October 2017. http://dx.doi.org/10.17487/rfc8269.
Full textYoon, S., J. Kim, H. Park, H. Jeong, and Y. Won. The SEED Cipher Algorithm and Its Use with the Secure Real-Time Transport Protocol (SRTP). RFC Editor, August 2010. http://dx.doi.org/10.17487/rfc5669.
Full textMcGrew, D., and E. Rescorla. Datagram Transport Layer Security (DTLS) Extension to Establish Keys for the Secure Real-time Transport Protocol (SRTP). RFC Editor, May 2010. http://dx.doi.org/10.17487/rfc5764.
Full textPetit-Huguenin, M., and G. Salgueiro. Multiplexing Scheme Updates for Secure Real-time Transport Protocol (SRTP) Extension for Datagram Transport Layer Security (DTLS). RFC Editor, September 2016. http://dx.doi.org/10.17487/rfc7983.
Full textFischl, J., H. Tschofenig, and E. Rescorla. Framework for Establishing a Secure Real-time Transport Protocol (SRTP) Security Context Using Datagram Transport Layer Security (DTLS). RFC Editor, May 2010. http://dx.doi.org/10.17487/rfc5763.
Full text