Academic literature on the topic 'Secure Real-Time Protocol (SRTP'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Secure Real-Time Protocol (SRTP.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Secure Real-Time Protocol (SRTP"

1

H.G., Shashidhar, Sanket Dessai, and Shilpa Chaudhari. "Design of Secure Transmission of Multimedia Data Using SRTP on Linux Platform." International Journal of Reconfigurable and Embedded Systems (IJRES) 4, no. 2 (July 1, 2015): 71. http://dx.doi.org/10.11591/ijres.v4.i2.pp71-81.

Full text
Abstract:
This paper aims for providing a viable solution for security in streaming media technology. Service providers do not want the end users to capture and duplicate streaming media data. Once captured data can be re-distributed to millions without any control from the source. Licensing issues also dictate the number of times end user may utilize the data. Encryption is not sufficient as it leaves the system vulnerable to duplication and recording after decryption. In this paper an attempt has been made to transmit digital multimedia data to multiple users. The transmission of the video/audio data has been attempted from one PC to another PC. While doing this, security considerations have to be taken care by using suitable encryption/decryption techniques. A research carried out on the different data transmission protocols reveals that the Secure Real Time Transport Protocol (SRTP) is one of the best available protocols. Hence the SRTP has been deployed in this project on Linux OS using socket programming. The code for the transmitter and the receiver is designed and developed around the SRTP library for transmission of multimedia data. The solution is illustrated by choosing an example of a video clip for transmission and reception. This model increasing the security of streaming media and adds a measure of integrity protection, but it is primarily intended to aid in replay preventions.
APA, Harvard, Vancouver, ISO, and other styles
2

Prastiawan, Hendra. "Analisa Kinerja VoIP Client dengan Menggunakan Modul RTP Terenkripsi dan SRTP pada Jaringan VoIP." Jurnal Telekomunikasi dan Komputer 5, no. 3 (February 27, 2017): 205. http://dx.doi.org/10.22441/incomtech.v5i3.1141.

Full text
Abstract:
Seiring dengan berkembangnya teknologi telekomunikasi dan komputer, banyak aplikasi-aplikasi yang mendukung komunikasi telepon melalui jaringan internet tumbuh dan berkembang. Layanan yang dimaksud adalah Voice over Internet Protocol atau biasa disebut dengan VoIP. VoIP yang menggunakan server-server gratis yang ada saat ini tidaklah menjamin keamanan dari sebuah percakapan yang dilakukan didalamnya. Oleh sebab itu, diperlukan sebuah VoIP Client yang dapat mengamankan data komunikasi tersebut. Walaupun sekarang sudah tersedia sebuah protokol aman dalam VoIP yang disebut SRTP atau Secure Real-Time Protocol, namun hal tersebut perlu dilakukan pengujian lebih lanjut dari kualitas layanan dengan membandingkan protokol tersebut dengan sebuah protokol biasa yang ditambahkan sebuah algoritma enkripsi untuk mengetahui kinerja protokol yang lebih baik digunakan dalam VoIP tersebut. Algoritma yang akan ditambahkan dalam protocol tersebut yaitu algoritma AES (Advanced Encryption Standard).
APA, Harvard, Vancouver, ISO, and other styles
3

Liu, Chun, and Kun Tan. "Research and Implementation of the Secure Database-Update Mechanism." Applied Mechanics and Materials 513-517 (February 2014): 1752–55. http://dx.doi.org/10.4028/www.scientific.net/amm.513-517.1752.

Full text
Abstract:
For a safety critical computer, large-scale data like database which has to be transferred in an instant time cannot be voted directly. This paper proposes a database update algorithm for safety critical computer based on status vote,which is to vote the database status instead of database itself. This algorithm can solve the problem of voting too much data in a short time, and compare versions of database of different modules in real time. A Markov model is built to calculate the safety and reliability of this algorithm. The results show that this algorithm meets the update requirement of safety critical computer. 1. Communication protocol for database update 1.1 TFTP protocol TFTP is a simple protocol for transporting document. It usually uses the UDP protocol to realize but the TFTP does not require the specific agreement of implementation and can implement with TCP in special occasions. [This agreement is designed for small file transferring, so it doesn't have function many FTP usually does; it can only acquire or write the file from the server and not able tot list directory, not authenticate. It transfers 8 bits of data with three models: netascii, the eight-bit ASCII form; octet, the eight-bit source data type; mail, no longer supported, it returns the data back directly to the user rather than saved as a file. 1.2 SRTP Ethernet security real-time data transfer protocol
APA, Harvard, Vancouver, ISO, and other styles
4

Yingyuan, Xiao, Liu Yunsheng, and Chen Xiangyang. "An efficient secure real-time concurrency control protocol." Wuhan University Journal of Natural Sciences 11, no. 6 (November 2006): 1899–902. http://dx.doi.org/10.1007/bf02831902.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Lee, Sungyoung, Byeong-Soo Jeong, and Hyon-Woo Seung. "A secure dynamic copy protocol in real-time secure database systems." ACM SIGPLAN Notices 34, no. 7 (July 1999): 73–79. http://dx.doi.org/10.1145/315253.314452.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

AlMahmoud, Abdelrahman, Maurizio Colombo, Chan Yeob Yeun, and Hassan Al Muhairi. "Secure communication protocol for real-time business process monitoring." International Journal of Internet Technology and Secured Transactions 5, no. 3 (2014): 223. http://dx.doi.org/10.1504/ijitst.2014.065183.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Chanjung Park, Seog Park, and S. H. Son. "Multiversion locking protocol with freezing for secure real-time database systems." IEEE Transactions on Knowledge and Data Engineering 14, no. 5 (September 2002): 1141–54. http://dx.doi.org/10.1109/tkde.2002.1033780.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Divya, K., and B. Srinivasan. "Trust Based Secure Multipath Routing Protocol for MANET." International Journal of Computer Science and Mobile Computing 10, no. 5 (May 30, 2021): 72–80. http://dx.doi.org/10.47760/ijcsmc.2021.v10i05.008.

Full text
Abstract:
MANETs gained popularity due to various notable features like dynamic topology, rapid setup, multihop data transmission, and so on. These prominent features make MANETs suitable for many real-time applications like environmental monitoring, disaster management, and covert and combat operations. Moreover, MANETs can also be integrated with emerging technologies like cloud computing, IoT, and machine learning algorithms to achieve the vision of Industry 4.0. All MANET-based sensitive real time applications require secure and reliable data transmission that must meet the required QoS. In MANET, achieving secure and energy-efficient data transmission is a challenging task. )e main strength of the proposed protocol is that it considers multiple factors like congestion control, packet loss reduction, malicious node detection, and secure data transmission to intensify the MANET’s QoS. The performance of the proposed protocol is analyzed through the simulation in NS2.
APA, Harvard, Vancouver, ISO, and other styles
9

Ahmed, Adel Ali, and Norsheila Fisal Fisal. "Secure real-time routing protocol with load distribution in wireless sensor networks." Security and Communication Networks 4, no. 8 (May 25, 2010): 839–69. http://dx.doi.org/10.1002/sec.214.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kim, Namgyu, Songchun Moon, and Yonglak Sohn. "Secure one snapshot protocol for concurrency control in real-time stock trading systems." Journal of Systems and Software 73, no. 3 (November 2004): 441–54. http://dx.doi.org/10.1016/j.jss.2003.08.236.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Secure Real-Time Protocol (SRTP"

1

Abad, Caballero Israel Manuel. "Secure Mobile Voice over IP." Thesis, KTH, Mikroelektronik och Informationsteknik, IMIT, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-93113.

Full text
Abstract:
Voice over IP (VoIP) can be defined as the ability to make phone calls and to send faxes (i.e., to do everything we can do today with the Public Switched Telephone Network, PSTN) over IP−based data networks with a suitable quality of service and potentially a superior cost/benefit ratio. There is a desire to provide (VoIP) with the suitable security without effecting the performance of this technology. This becomes even more important when VoIP utilizes wireless technologies as the data networks (such as Wireless Local Area Networks, WLAN), given the bandwidth and other constraints of wireless environments, and the data processing costs of the security mechanisms. As for many other (secure) applications, we should consider the security in Mobile VoIP as a chain, where every link, from the secure establishment to the secure termination of a call, must be secure in order to maintain the security of the entire process. This document presents a solution to these issues, providing a secure model for Mobile VoIP that minimizes the processing costs and the bandwidth consumption. This is mainly achieved by making use of high− throughput, low packet expansion security protocols (such as the Secure Real−Time Protocol, SRTP); and high−speed encryption algorithms (such as the Advanced Encryption Standard, AES). In the thesis I describe in detail the problem and its alternative solutions. I also describe in detail the selected solution and the protocols and mechanisms this solution utilizes, such as the Transport Layer Security (TLS) for securing the Session Initiation Protocol (SIP), the Real−Time Protocol (RTP) profile Secure Real−Time Protocol (SRTP) for securing the media data transport , and the Multimedia Internet KEYing (MIKEY) as the key−management protocol. Moreover, an implementation of SRTP, called MINIsrtp, is also provided. The oral presentation will provide an overview of these topics, with an in depth examination of those parts which were the most significant or unexpectedly difficult. Regarding my implementation, evaluation, and testing of the model, this project in mainly focused on the security for the media stream (SRTP). However, thorough theoretical work has also been performed and will be presented, which includes other aspects, such as the establishment and termination of the call (using SIP) and the key−management protocol (MIKEY).
Voice over IP (VoIP) kan defineras som förmågan att göra ett telefonsamtal och att skicka fax (eller att göraallting som man idag kan göra över det publika telefonnätet) över ett IP−baserat nätverk med en passande kvalitet och till lägre kostnad, alternativt större nytta. VoIP måste tillhandahållas med nödvändiga säkerhetstjänster utan att teknikens prestanta påverkas. Detta blir allt viktigare när VoIP används över trådlösa länktekniker (såsom trådlösa lokala nätverk, WLAN), givet dessa länkars begränsade bandbredd och den bearbetningkraft som krävs för att exekvera säkerhetsmekanismerna. Vi måste tänka på VoIPs säkerhet likt en kedja där inte någon länk, från säker uppkoppling till säker nedkoppling, får fallera för att erhålla en säker process. I detta dokument presenteras en lösning på detta problem och innefattar en säker modell för Mobile VoIP som minimerar bearbetningskostnaderna och bandbreddsutnyttjandet. Detta erhålls huvudsakligen genom utnyttjande av säkerhetsprotokoll med hög genomströmning och låg paketexpansion, såsom "Secure Real− time Protocol" (SRTP), och av krypteringsprotokoll med hög hastighet, såsom "Advanced Encryption Standard" (AES). I detta dokument beskriver jag problemet och dess alternativa lösningar. Jag beskriver också den valda lösningen och dess protokoll och mekanismer mer detaljerat, till exempel "Transport Layer Security" (TLS) för att säkra "Session Initiation Protocol" (SIP), SRTP för att skydda transporten av data och "Multimedia Internet KEYing" (MIKEY) för nyckelhantering. En implementation av SRTP, kallad MINIsrtp, finns också beskriven. Beträffande praktiskt arbete och tester av lösningsmodellen har detta projekt fokuserats på skyddandet av datatransporten (SRTP), dess implementation och prestanda. Emellertid har en grundlig teoretisk undersökning genomförts, vilken innefattar andra aspekter såsom telefonsamtalets uppkoppling och nedkoppling (med hjälp av SIP) och valet av passande nyckelhanteringsprotokoll (MIKEY) för att stödja SRTP.
APA, Harvard, Vancouver, ISO, and other styles
2

Mohanty, Saswat. "Using Secure Real-time Padding Protocol to Secure Voice-over-IP from Traffic Analysis Attacks." Thesis, 2011. http://hdl.handle.net/1969.1/ETD-TAMU-2011-05-9116.

Full text
Abstract:
Voice Over IP (VoIP) systems and transmission technologies have now become the norm for many communications applications. However, whether they are used for personal communication or priority business conferences and talks, privacy and confidentiality of the communication is of utmost priority. The present industry standard is to encrypt VoIP calls using Secure Real-time Transport Protocol (SRTP), aided by ZRTP, but this methodology remains vulnerable to traffic analysis attacks, some of which utilize the length of the encrypted packets to infer the language and spoken phrases of the conversation. Secure Real-time Padding Protocol (SRPP) is a new RTP profile which pads all VoIP sessions in a unique way to thwart traffic analysis attacks on encrypted calls. It pads every RTP or SRTP packet to a predefined packet size, adds dummy packets at the end of every burst in a controllable way, adds dummy bursts to hide silence spurts, and hides information about the packet inter-arrival timings. This thesis discusses a few practical approaches and a theoretical optimization approach to packet size padding. SRPP has been implemented in the form of a library, libSRPP, for VoIP application developers and as an application, SQRKal, for regular users. SQRKal also serves as an extensive platform for implementation and verification of new packet padding techniques.
APA, Harvard, Vancouver, ISO, and other styles
3

Ravi, Niranjan. "Integration of UAVS with Real Time Operating Systems and Establishing a Secure Data Transmission." Thesis, 2019. http://hdl.handle.net/1805/19920.

Full text
Abstract:
Indiana University-Purdue University Indianapolis (IUPUI)
In today’s world, the applications of Unmanned Aerial Vehicle (UAV) systems are leaping by extending their scope from military applications on to commercial and medical sectors as well. Owing to this commercialization, the need to append external hardware with UAV systems becomes inevitable. This external hardware could aid in enabling wireless data transfer between the UAV system and remote Wireless Sensor Networks (WSN) using low powered architecture like Thread, BLE (Bluetooth Low Energy). The data is being transmitted from the flight controller to the ground control station using a MAVlink (Micro Air Vehicle Link) protocol. But this radio transmission method is not secure, which may lead to data leakage problems. The ideal aim of this research is to address the issues of integrating different hardware with the flight controller of the UAV system using a light-weight protocol called UAVCAN (Unmanned Aerial Vehicle Controller Area Network). This would result in reduced wiring and would harness the problem of integrating multiple systems to UAV. At the same time, data security is addressed by deploying an encryption chip into the UAV system to encrypt the data transfer using ECC (Elliptic curve cryptography) and transmitting it to cloud platforms instead of radio transmission.
APA, Harvard, Vancouver, ISO, and other styles
4

(7013471), NIRANJAN RAVI. "Integration of UAVS with Real Time Operating Systems and Establishing a Secure Data Transmission." Thesis, 2019.

Find full text
Abstract:
In today’s world, the applications of Unmanned Aerial Vehicle (UAV) systems are leaping by extending their scope from military applications on to commercial and medical sectors as well. Owing to this commercialization, the need to append external hardware with UAV systems becomes inevitable. This external hardware could aid in enabling wireless data transfer between the UAV system and remote Wireless Sensor Networks (WSN) using low powered architecture like Thread, BLE (Bluetooth Low Energy). The data is being transmitted from the flight controller to the ground control station using a MAVlink (Micro Air Vehicle Link) protocol. But this radio transmission method is not secure, which may lead to data leakage problems. The ideal aim of this research is to address the issues of integrating different hardware with the flight controller of the UAV system using a light-weight protocol called UAVCAN (Unmanned Aerial Vehicle Controller Area Network). This would result in reduced wiring and would harness the problem of integrating multiple systems to UAV. At the same time, data security is addressed by deploying an encryption chip into the UAV system to encrypt the data transfer using ECC (Elliptic curve cryptography) and transmitting it to cloud platforms instead of radio transmission.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Secure Real-Time Protocol (SRTP"

1

Oryńczak, Grzegorz, and Zbigniew Kotulski. "Context-Aware Secure Routing Protocol for Real-Time Services." In Communications in Computer and Information Science, 193–207. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-662-44893-9_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Mukkamala, Ravi, and Sang H. Son. "A secure concurrency control protocol for real-time databases." In IFIP Advances in Information and Communication Technology, 215–30. Boston, MA: Springer US, 1996. http://dx.doi.org/10.1007/978-0-387-34932-9_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Park, C., S. Park, and S. Son. "Priority-driven secure multiversion locking protocol for real-time secure database systems." In Database Security XI, 229–44. Boston, MA: Springer US, 1998. http://dx.doi.org/10.1007/978-0-387-35285-5_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Shemaili, Mouza Ahmed Bani, Chan Yeob Yeun, Mohamed Jamal Zemerly, Khalid Mubarak, Hyun Ku Yeun, Yoon Seok Chang, Basim Zafar, Mohammed Simsim, Yasir Salih, and Gaemyoung Lee. "A New Lightweight Mutual Authentication Protocol to Secure Real Time Tracking of Radioactive Sources." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 231–46. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-90775-8_19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kaddar, Lamia. "Incorporating Security and Energy Efficiency for Multimedia Communications in WANets." In Technological Advancements and Applications in Mobile Ad-Hoc Networks, 228–46. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-4666-0321-9.ch014.

Full text
Abstract:
The security of multimedia data in Wireless Ad hoc Networks (WANet) is commonly provided by encryption, which consists in transforming a plain text message into an unintelligible ciphertext. Nevertheless, the classical and modern ciphers have all been developed without taking into consideration the intrinsic characteristics of multimedia flows. In this chapter, the author proposes to reduce the computational requirements for the multimedia flow’s encryption when the energy is a limited resource, as it is the case of WANets. Thus, the chapter defines a new profile of Secure Real Time Protocol (SRTP), named EE_SRTP. EE_SRTP provides energy efficiency to SRTP, which provides essentially confidentiality, message authentication, and replay protection to the RTP traffic. In EE_SRTP, the author exploits the dependency existing between the frames created by the inter-frame coding to further improve the energy-efficiency of the encryption process. In contrast with the existing approaches, this chapter presents an experimental model that integrates EE_SRTP to Video LAN Coding (VLC). Therefore, to validate EE_SRTP, the author implements a secure version of VLC (SecVLC). The performance evaluation demonstrates clearly that using this new scheme in the context of wireless ad hoc nodes allows saving energy while ensuring a high level of content confidentiality, without adding an overhead to the wireless network.
APA, Harvard, Vancouver, ISO, and other styles
6

Oehler, Michael. "Securing Multimedia and VoIP Content with the Secure Real-Time Transport Protocol." In Security in Distributed and Networking Systems, 55–72. WORLD SCIENTIFIC, 2007. http://dx.doi.org/10.1142/9789812770103_0003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ciszkowski, Tomasz, and Zbigniew Kotulski. "Secure Routing with Reputation in MANET." In Handbook of Research on Wireless Security, 449–60. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-899-4.ch028.

Full text
Abstract:
The pervasiveness of wireless communication recently gave mobile ad hoc networks (MANET) significant researchers’ attention, due to its innate capabilities of instant communication in many time and mission critical applications. However, its natural advantages of networking in civilian and military environments make it vulnerable to security threats. Support for anonymity in MANET is orthogonal to a critical security challenge we faced in this chapter. We propose a new anonymous authentication protocol for mobile ad hoc networks enhanced with a distributed reputation system. The main objective is to provide mechanisms concealing a real identity of communicating nodes with an ability of resistance to known attacks. The distributed reputation system is incorporated for a trust management and malicious behaviour detection in the network.
APA, Harvard, Vancouver, ISO, and other styles
8

Chandrakar, Preeti. "A Secure Remote User Authentication Protocol for Healthcare Monitoring Using Wireless Medical Sensor Networks." In Research Anthology on Telemedicine Efficacy, Adoption, and Impact on Healthcare Delivery, 549–72. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-8052-3.ch029.

Full text
Abstract:
The wireless medical sensor networks WMSN play a crucial role in healthcare monitoring remotely. In remote healthcare monitoring, the sensor nodes are deployed in patient's body for collecting physiological data and transmit these data over an insecure channel. The patient's health information is highly sensitive and important. Any malicious modification in physiological data will make wrong diagnoses and harm the patient health. Therefore, privacy, data security, and user authentication are extremely important for accessing patient's real-time heath information over an insecure channel. In this regard, this article proposes a secure and robust two-factor based remote user authentication protocol for healthcare monitoring. The authentication proof has done with the help of BAN logic, which ensures that the proposed scheme provides mutual authentication and session key agreement securely. The informal security verification proves that the developed protocol is secure from various security attacks. The simulation of the proposed scheme has been done using AVISPA tool, whose simulation results confirm that the proposed scheme is secure from active and passive attacks. Performance evaluation shows that the proposed protocol is efficient in terms of security features, computation cost, communication cost, and execution time.
APA, Harvard, Vancouver, ISO, and other styles
9

Augusto, Alexandre B., and Manuel E. Correia. "A Secure and Dynamic Mobile Identity Wallet Authorization Architecture Based on a XMPP Messaging Infrastructure." In Innovations in XML Applications and Metadata Management, 21–37. IGI Global, 2013. http://dx.doi.org/10.4018/978-1-4666-2669-0.ch002.

Full text
Abstract:
In this chapter, the authors propose and describe an identity management framework that allows users to asynchronously control and effectively share sensitive dynamic data, thus guaranteeing security and privacy in a simple and transparent way. Their approach is realised by a fully secure mobile identity digital wallet, running on mobile devices (Android devices), where users can exercise discretionary control over the access to sensitive dynamic attributes, disclosing their value only to pre-authenticated and authorised users for determined periods of time. For that, the authors rely on an adaptation of the OAuth protocol to authorise and secure the disclosure of personal-private user data by the usage of token exchange and new XML Schemas to establish secure authorisation and disclosure of a set of supported dynamic data types that are being maintained by the personal mobile digital wallet. The communication infrastructure is fully implemented over the XMPP instant messaging protocol and is completely compatible with the public XMPP large messaging infrastructures already deployed on the Internet for real time XML document interchange.
APA, Harvard, Vancouver, ISO, and other styles
10

Sarella, Venkata Ramana, Deshai Nakka, Sekhar B. V. D. S., Krishna Rao Sala, and Sameer Chakravarthy V. V. S. S. "An Experimental Analysis of Modified EEECARP." In Advances in Library and Information Science, 318–36. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-1786-4.ch012.

Full text
Abstract:
Designing various energy-saving routing protocols for real-time internet of things (IoT) applications in modern secure wireless sensor networks (MS-WSN) is a tough task. Many hierarchical protocols for WSNs were not well scalable to large-scale IoT applications. Low energy adaptive two-level-CH clustering hierarchy (LEATCH) is an optimized technique reduces the energy-utilization of few cluster heads, but the LEATCH is not suitable for scalable and dynamic routing. For dynamic routing in MS-WSN, energy efficiency and event clustering adaptive routing protocol (EEECARP) with event-based dynamic clustering and relay communication by selecting intermediates nodes as relay-nodes is necessary. However, EEECARP cannot consider the hop-count, different magnitude ecological conditions, and energy wastage in cluster formation while collisions occur. So, the authors propose the modified EEECARP to address these issues for better dynamic event clustering adaptive routing to improve the lifetime of MS-WSNs. The experimental outcomes show that proposed protocol achieves better results than EEECARP and LEATCH.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Secure Real-Time Protocol (SRTP"

1

Alexander, Andre L., Alexander L. Wijesinha, and Ramesh Karne. "An Evaluation of Secure Real-Time Transport Protocol (SRTP) Performance for VoIP." In 2009 Third International Conference on Network and System Security. IEEE, 2009. http://dx.doi.org/10.1109/nss.2009.90.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Mohammed, Mazen Tawfik, Alaa Eldin Rohiem, and Ali El-moghazy. "Confidentiality enhancement of Secure Real Time Transport Protocol." In 2012 8th International Computer Engineering Conference (ICENCO). IEEE, 2012. http://dx.doi.org/10.1109/icenco.2012.6487088.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Lee, Sungyoung, Byeong-Soo Jeong, and Hyon-Woo Seung. "A secure dynamic copy protocol in real-time secure database systems." In the ACM SIGPLAN 1999 workshop. New York, New York, USA: ACM Press, 1999. http://dx.doi.org/10.1145/314403.314452.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Seftyanto, Donny, and Yusuf Kurniawan. "Key management analysis of secure real time protocol version 2." In 2017 International Conference on Information Technology Systems and Innovation (ICITSI). IEEE, 2017. http://dx.doi.org/10.1109/icitsi.2017.8267955.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Sen, Nilanjan, Ram Dantu, and Mark Thompson. "Performance Analysis of Secure Real-time Transport Protocol Using Elliptic Curves." In 2020 IEEE International Conference on Intelligence and Security Informatics (ISI). IEEE, 2020. http://dx.doi.org/10.1109/isi49825.2020.9280526.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Rabee, Furkan, Yong Liao, and Maolin Yang. "Minimizing Multiple-Priority Inversion Protocol in Hard Real Time System." In 2013 IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC). IEEE, 2013. http://dx.doi.org/10.1109/dasc.2013.62.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Liao, Cheng-Fu, Yung-Feng Lu, Ai-Chun Pang, and Tei-Wei Kuo. "A Secure Routing Protocol for Wireless Embedded Networks." In 2008 14th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA). IEEE, 2008. http://dx.doi.org/10.1109/rtcsa.2008.40.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Dermanilian, Hoseb M., and Imad H. Elhajj. "Evaluating Secure Real-Time Transport Protocol performance on power constrained handheld devices." In 2010 International Conference on Energy Aware Computing (ICEAC). IEEE, 2010. http://dx.doi.org/10.1109/iceac.2010.5702299.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Murtaza, Abid, and Liu Jianwei. "A simple, secure and efficient authentication protocol for real-time earth observation through satellite." In 2018 15th International Bhurban Conference on Applied Sciences and Technology (IBCAST). IEEE, 2018. http://dx.doi.org/10.1109/ibcast.2018.8312319.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Alshowkan, Muneer, Khaled Elleithy, and Hussain Alhassan. "LS-LEACH: A New Secure and Energy Efficient Routing Protocol for Wireless Sensor Networks." In 2013 IEEE/ACM 17th International Symposium on Distributed Simulation and Real Time Applications (DS-RT). IEEE, 2013. http://dx.doi.org/10.1109/ds-rt.2013.31.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Secure Real-Time Protocol (SRTP"

1

Baugher, M., D. McGrew, M. Naslund, E. Carrara, and K. Norrman. The Secure Real-time Transport Protocol (SRTP). RFC Editor, March 2004. http://dx.doi.org/10.17487/rfc3711.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Jennings, C., P. Jones, R. Barnes, and A. B. Roach. Double Encryption Procedures for the Secure Real-Time Transport Protocol (SRTP). RFC Editor, April 2020. http://dx.doi.org/10.17487/rfc8723.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Lennox, J. Encryption of Header Extensions in the Secure Real-time Transport Protocol (SRTP). RFC Editor, April 2013. http://dx.doi.org/10.17487/rfc6904.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

McGrew, D., and K. Igoe. AES-GCM Authenticated Encryption in the Secure Real-time Transport Protocol (SRTP). RFC Editor, December 2015. http://dx.doi.org/10.17487/rfc7714.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Lehtovirta, V., M. Naslund, and K. Norrman. Integrity Transform Carrying Roll-Over Counter for the Secure Real-time Transport Protocol (SRTP). RFC Editor, January 2007. http://dx.doi.org/10.17487/rfc4771.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kim, W., J. Lee, J. Park, D. Kwon, and D. Kim. The ARIA Algorithm and Its Use with the Secure Real-Time Transport Protocol (SRTP). RFC Editor, October 2017. http://dx.doi.org/10.17487/rfc8269.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Yoon, S., J. Kim, H. Park, H. Jeong, and Y. Won. The SEED Cipher Algorithm and Its Use with the Secure Real-Time Transport Protocol (SRTP). RFC Editor, August 2010. http://dx.doi.org/10.17487/rfc5669.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

McGrew, D., and E. Rescorla. Datagram Transport Layer Security (DTLS) Extension to Establish Keys for the Secure Real-time Transport Protocol (SRTP). RFC Editor, May 2010. http://dx.doi.org/10.17487/rfc5764.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Petit-Huguenin, M., and G. Salgueiro. Multiplexing Scheme Updates for Secure Real-time Transport Protocol (SRTP) Extension for Datagram Transport Layer Security (DTLS). RFC Editor, September 2016. http://dx.doi.org/10.17487/rfc7983.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Fischl, J., H. Tschofenig, and E. Rescorla. Framework for Establishing a Secure Real-time Transport Protocol (SRTP) Security Context Using Datagram Transport Layer Security (DTLS). RFC Editor, May 2010. http://dx.doi.org/10.17487/rfc5763.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography