Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

ZRTP

Known as: SAS, Short Authentication String 
ZRTP (composed of Z and Real-time Transport Protocol) is a cryptographic key-agreement protocol to negotiate the keys for encryption between two end… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2018
Review
2018
This document discusses issues and problems occuring in the design of device pairing mechanism. It presents experience with… Expand
Is this relevant?
2016
2016
D2D communications facilitate proximal devices to directly communicate with each other, bypassing cellular base stations or… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2014
2014
The need to secure communications between personal devices is increasing nowadays, especially in the context of Internet of… Expand
  • table I
  • figure 1
  • table II
  • table III
Is this relevant?
Highly Cited
2011
Highly Cited
2011
This document defines ZRTP, a protocol for media path Diffie-Hellman exchange to agree on a session key and parameters for… Expand
  • figure 2
  • table 1
  • table 2
  • table 3
  • table 4
Is this relevant?
2010
2010
When some agents want to communicate through a media stream (for example voice or video), the Real Time Protocol (RTP) is used… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 5
Is this relevant?
2009
2009
When some agents want to communicate through a media stream (for example voice or video), the Real Time Protocol (RTP) is used… Expand
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2008
Highly Cited
2008
Wireless networking is widespread in public places such as cafes. Unsuspecting users may become victims of attacks based on "evil… Expand
  • figure 1
  • figure 2
  • figure 5
Is this relevant?
2008
2008
ZRTP is a protocol designed to set up a shared secret between two com- munication parties which is subsequently used to secure… Expand
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
2008
2008
Pure peer-to-peer communication, such as voice over IP (VoIP), cannot rely on third parties on security. ZRTP is a solution for… Expand
Is this relevant?
2008
2008
In this paper we present and discuss a new approach for securing multimedia communication, which is based on three innovations… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?