[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
Reflects downloads up to 12 Dec 2024Bibliometrics
Skip Abstract Section
Abstract

This document describes the Secure Real-time Transport Protocol (SRTP), a profile of the Real-time Transport Protocol (RTP), which can provide confidentiality, message authentication, and replay protection to the RTP traffic and to the control traffic for RTP, the Real-time Transport Control Protocol (RTCP).

RFC Downloads

Cited By

  1. ACM
    Reisinger T, Wagner I and Boiten E (2022). Security and Privacy in Unified Communication, ACM Computing Surveys, 55:3, (1-36), Online publication date: 30-Apr-2023.
  2. ACM
    Michel O, Sengupta S, Kim H, Netravali R and Rexford J Enabling passive measurement of zoom performance in production networks Proceedings of the 22nd ACM Internet Measurement Conference, (244-260)
  3. ACM
    De Coninck Q (2022). The packet number space debate in multipath QUIC, ACM SIGCOMM Computer Communication Review, 52:3, (2-9), Online publication date: 30-Jul-2022.
  4. ACM
    MacMillan K, Mangla T, Saxon J and Feamster N Measuring the performance and network utilization of popular video conferencing applications Proceedings of the 21st ACM Internet Measurement Conference, (229-244)
  5. ACM
    Blum N, Lachapelle S and Alvestrand H (2021). WebRTC, Communications of the ACM, 64:8, (50-54), Online publication date: 1-Aug-2021.
  6. Kanoune Y, Yahiaoui C and Rachedi A Toward an approach for securing IMS signaling and media planes GLOBECOM 2020 - 2020 IEEE Global Communications Conference, (1-6)
  7. ACM
    Barradas D, Santos N, Rodrigues L and Nunes V Poking a Hole in the Wall: Efficient Censorship-Resistant Internet Communications by Parasitizing on WebRTC Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, (35-48)
  8. Jha A, Mancillas-López C, Nandi M and Sen Gupta S (2019). On Random Read Access in ${\mathsf{OCB}}$ , IEEE Transactions on Information Theory, 65:12, (8325-8344), Online publication date: 1-Dec-2019.
  9. ACM
    Aigner A and Zeller R HEHLKAPPE Proceedings of the 14th International Conference on Availability, Reliability and Security, (1-8)
  10. ACM
    Sousa P, Cirne A, Resende J, Martins R and Antunes L pTASC Proceedings of the 20th International Conference on Distributed Computing and Networking, (193-202)
  11. ACM
    Perkins C and Ott J Real-time Audio-Visual Media Transport over QUIC Proceedings of the Workshop on the Evolution, Performance, and Interoperability of QUIC, (36-42)
  12. ACM
    Hoang V, Tessaro S and Thiruvengadam A The Multi-user Security of GCM, Revisited Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, (1429-1440)
  13. ACM
    Mandalari A, Lutu A, Custura A, Safari Khatouni A, Alay Ö, Bagnulo M, Bajpai V, Brunstrom A, Ott J, Mellia M and Fairhurst G Experience Proceedings of the 24th Annual International Conference on Mobile Computing and Networking, (179-189)
  14. Chang Y, Lin Y, Chen Y and Wang W (2017). Scrambling-based cryptography with a programmable SLM-based filter-triggered chaotic tent/hologram mapping algorithm for secure H.264/AVC video streaming over a WDM network, Multimedia Tools and Applications, 76:23, (25421-25453), Online publication date: 1-Dec-2017.
  15. Alsmirat M, Obaidat I, Jararweh Y and Al-Saleh M (2017). A security framework for cloud-based video surveillance system, Multimedia Tools and Applications, 76:21, (22787-22802), Online publication date: 1-Nov-2017.
  16. ACM
    Azevedo J, Pereira R and Chainho P An API proposal for integrating sensor data into web apps and WebRTC Proceedings of the 1st Workshop on All-Web Real-Time Systems, (1-5)
  17. ACM
    Amirante A, Castaldi T, Miniero L and Romano S Janus Proceedings of the Conference on Principles, Systems and Applications of IP Telecommunications, (1-8)
  18. ACM
    Marx R, Kuntze N and Lauer H Bringing VoIP Signatures to Mobile Devices Proceedings of Principles, Systems and Applications on IP Telecommunications, (1-7)
  19. El Kalam A, Maachaoui M, Idboufker N, Lahcen H and Ouahman A (2012). A Secure Architecture for Nomadic User in IMS Network, International Journal of Mobile Computing and Multimedia Communications, 4:1, (1-17), Online publication date: 1-Jan-2012.
  20. Ghini V, Ferretti S and Panzieri F (2011). The "Always Best Packet Switching" architecture for SIP-based mobile multimedia services, Journal of Systems and Software, 84:11, (1827-1851), Online publication date: 1-Nov-2011.
  21. Segec P and Kovacikova T (2011). A survey of open source products for building a SIP communication platform, Advances in Multimedia, 2011, (5-5), Online publication date: 1-Jan-2011.
  22. ACM
    Wright C, Ballard L, Coull S, Monrose F and Masson G (2010). Uncovering Spoken Phrases in Encrypted Voice over IP Conversations, ACM Transactions on Information and System Security, 13:4, (1-30), Online publication date: 1-Dec-2010.
  23. Khaksari G, Wijesinha A and Karne R Secure VoIP using a bare PC Proceedings of the 3rd international conference on New technologies, mobility and security, (192-196)
  24. De Souza Pereira J, Kofuji S and Rosa P Distributed systems ontology Proceedings of the 3rd international conference on New technologies, mobility and security, (69-73)
  25. ACM
    Floroiu J and Sisalem D A comparative analysis of the security aspects of the multimedia key exchange protocols Proceedings of the 3rd International Conference on Principles, Systems and Applications of IP Telecommunications, (1-10)
  26. Arachchi H, Perramon X, Dogan S and Kondoz A (2009). Adaptation-aware encryption of scalable H.264/AVC video for content security, Image Communication, 24:6, (468-483), Online publication date: 1-Jul-2009.
  27. ACM
    Chalouf M, Djama I, Ahmed T and Krief F On tightly managing end-to-end QoS and security for IPTV service delivery Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, (1030-1034)
  28. ACM
    Zhang R, Wang X, Farley R, Yang X and Jiang X On the feasibility of launching the man-in-the-middle attacks on VoIP from remote attackers Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, (61-69)
  29. ACM
    Passito A, Mota E and Mota E Analysis of the secure RTP protocol on voice over wireless networks using extended MedQoS Proceedings of the 2009 ACM symposium on Applied Computing, (86-87)
  30. Vlachos M, Anagnostopoulos A, Verscheure O and Yu P (2009). Online pairing of VoIP conversations, The VLDB Journal — The International Journal on Very Large Data Bases, 18:1, (77-98), Online publication date: 1-Jan-2009.
  31. ACM
    Peltotalo J, Harju J, Saukko M, Väätämöinen L, Bouazizi I and Curcio I Personal mobile broadcasting based on the 3GPP MBMS system Proceedings of the 6th International Conference on Advances in Mobile Computing and Multimedia, (156-162)
  32. ACM
    de Farias C, Lustosa L, Rodrigues P and Moreira P Combinaçao de pilhas de protocolo para a construçao de um softphone SIP Proceedings of the 14th Brazilian Symposium on Multimedia and the Web, (178-185)
  33. ACM
    Saklikar S and Saha S Identity federation for voip-based services Proceedings of the 2007 ACM workshop on Digital identity management, (62-71)
  34. ACM
    Kopsidas S, Zisiadis D and Tassiulas L A secure voip conference system: architecture analysis and design issues Proceedings of the 3rd ACM workshop on QoS and security for wireless and mobile networks, (180-183)
  35. Kim M, Lim M, Sohn J and Lee D Security and handover designs for VoWLAN system Proceedings of the 10th Asia-Pacific conference on Network Operations and Management Symposium: managing next generation networks and services, (447-456)
  36. Yang K and Kim K A frame-based selective encryption method for real time video transmission on VoIP Proceedings of the 2007 international conference on Frontiers of High Performance Computing and Networking, (115-122)
  37. McGrew D and Fluhrer S The security of the extended codebook (XCB) mode of operation Proceedings of the 14th international conference on Selected areas in cryptography, (311-327)
  38. Wright C, Ballard L, Monrose F and Masson G Language identification of encrypted VoIP traffic Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium, (1-12)
  39. Zhang R, Wang X, Yang X and Jiang X Billing attacks on SIP-based VoIP systems Proceedings of the first USENIX workshop on Offensive Technologies, (1-8)
  40. Akkus I, Ozkasap O and Civanlar M Secure transmission of video on an end system multicast using public key cryptography Proceedings of the 2006 international conference on Multimedia Content Representation, Classification and Security, (603-610)
  41. ACM
    Bassil C, Serhrouchni A and Rouhana N Simple voice security protocol Proceedings of the 2006 international conference on Wireless communications and mobile computing, (367-372)
  42. Bassil C, Serhrouchni A and Rouhana N Critical analysis and new perspective for securing voice networks Proceedings of the 4th international conference on Networking - Volume Part II, (810-818)
  43. Cvrk L, Zeman V and Komosny D H.323 client-independent security approach Proceedings of the 4th international conference on Networking - Volume Part II, (673-680)
  44. McGrew D and Viega J The security and performance of the galois/counter mode (GCM) of operation Proceedings of the 5th international conference on Cryptology in India, (343-355)
  45. ACM
    Sicker D and Lookabaugh T (2004). VoIP Security: Not an Afterthought, Queue, 2:6, (56-64), Online publication date: 1-Sep-2004.
  46. Hong K, Jung S, Lo Iacono L and Ruland C Impacts of security protocols on real-time multimedia communications Proceedings of the 5th international conference on Information Security Applications, (1-13)
Contributors
  • Telefonaktiebolaget LM Ericsson
Please enable JavaScript to view thecomments powered by Disqus.

Recommendations