DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» ZRTP
ZRTP
Uila Supported Apps
The Handshake - Establishing Secure Connections Over Insecure Channels
Wiretapping End-To-End Encrypted Voip Calls Real-World Attacks on ZRTP
AUTHENTICATION TECHNIQUES for HETEROGENEOUS TELEPHONE NETWORKS by BRADLEY GALLOWAY REAVES a DISSERTATION PRESENTED to the GRADUA
Zfone: a New Approach for Securing Voip Communication
How to Use Encryption and Privacy Tools to Evade Corporate Espionage
Crypto Projects That Might Not Suck
Mitigating Quantum Computing Threats and Attacks
Linphone Instant Messaging Encryption
Protec3ng Messaging Other Than Email, Plus Network Link Protec3on
Architecture and Components for Secure and Anonymous Peer-To
Algorithms for Lightweight Key Exchange †
Design and Implementation Encrypted Call Application on Android System
Post-Snowden Cryptography
Wiretapping End-To-End Encrypted Voip Calls: Real-World Attacks on ZRTP
Real-Time Communications Quick Start Guide
Protocols for Encrypted Phone Calls Steven J
Linphone Instant Message Encryption V2.0 (Lime V2.0)
Top View
ABTO Ios SIP SDK Devmanual.Pdf
Summary of Recent Attacks and Motivation for Action
ABTO Voip SIP SDK for Ios General Description
IT Acronyms at Your Fingertips a Quick References Guide with Over 3,000 Technology Related Acronyms
Security Analysis of the MLS Key Distribution Chris Brzuska, Eric Cornelissen, Konrad Kohbrok Aalto University, Finland
Wiretapping End-To-End Encrypted Voip Calls: Real-World Attacks on ZRTP
Traffic Analysis Attacks to Encrypted Voip Calls
Critical Capabilities for High-Security Mobility Management
Asynchronous Ratcheted Key Exchange
On Post-Compromise Security
Secure Messaging1
Secure Handling of Electronic Health Records for Telemedicine Applications
Cyber Review 10
Post-Snowden Cryptography March 2017 Bart Preneel
Skype and the Flux-Capacitor
Simulation and Formal Verification of SIP/ZRTP Protocol Using UPPAAL Aishwarya Raghavan, P.P
Crypto Crumple Zones: Enabling Limited Access Without Mass Surveillance
Security and Usability Aspects of Man-In-The-Middle Attacks on ZRTP