Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,101,586 papers from all fields of science
Search
Sign In
Create Free Account
MIKEY
Multimedia Internet KEYing (MIKEY) is a key management protocol that is intended for use with real-time applications. It can specifically be used to…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
9 relations
ID-based cryptography
Internet Key Exchange
Key-agreement protocol
Pre-shared key
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Reliable Voice-Based Transactions over VoIP Communications
G. Cattaneo
,
Luigi Catuogno
,
Fabio Petagna
,
Gianluca Roscigno
International Conference on Innovative Mobile and…
2015
Corpus ID: 17449288
Nowadays, plenty of sensitive transactions are provided through call centers such as bank operations, goods purchase and…
Expand
2012
2012
MiniSIP as a Plug-in
Arun Arumugam Mathivanan
2012
Corpus ID: 59985456
Internet telephony has rapidly becoming an integral part of life. Due to its low incremental cost and the wide availability of…
Expand
2012
2012
A Trustable Key Exchange Protocol for Mobile Oriented VoIP Devices via ECDH and Synchronous Key Update Mechanism
D. Chandirasekaran
,
G. Aghila
,
P. Thiyagarajan
2012
Corpus ID: 62754487
2011
2011
Secure Network Mobility (SeNEMO) for Real-Time Applications
Tuan-Che Chen
,
Jyh-cheng Chen
,
Zong-Hua Liu
IEEE Transactions on Mobile Computing
2011
Corpus ID: 14156515
The IETF NEtwork MObility (NEMO) working group has considered how to enable an entire network to move from one location to…
Expand
2011
2011
Evaluation of VoIP media security for smartphones in the context of IMS
Prajwol Kumar Nakarmi
,
J. Mattsson
,
Gerald Q. Maguire
Swedish Communication Technologies Workshop
2011
Corpus ID: 21806915
Market research reports by In-Stat, Gartner, and the Swedish Post and Telecom Agency (PTS) reveal a growing worldwide demand for…
Expand
2005
2005
Secure VoIP : call establishment and media protection
Johan Bilien
,
Erik Eliasson
,
Joachim Orrblad
,
Jon-Olov Vatn
2005
Corpus ID: 19103
In this paper we study the possibility of establishing a secure VoIP telephone call using SIP. Different security services…
Expand
2005
2005
Group Key Distribution in Ad-Hoc Networks Using MIKEY
Jukka Kaavi
2005
Corpus ID: 37608235
Ad-hoc networks are gaining more and more popularity together with the technological advancements in the field of mobile devices…
Expand
Review
2005
Review
2005
Group Key Management in Multicast Security
Firdaus Mah
2005
Corpus ID: 1090652
One of the major obstacles for the deployment of multicast is the lack of security. And in multicast security, key management for…
Expand
2001
2001
We Were the Mulvaneys
J. C. Oates
2001
Corpus ID: 161555808
Joyce Carol Oates' popular novel We Were the Mulvaneys is the wonderful, richly engaging story of how one idyllic American family…
Expand
2001
2001
Hydrogen atom abstraction pathways to functionalised free radicals
Rachel K. Lush
2001
Corpus ID: 97763770
Radical translocation chemistry has classically been employed for the generation of carboncentred radicals as a means of…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE