Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

ZRTP

Known as: SAS, Short Authentication String 
ZRTP (composed of Z and Real-time Transport Protocol) is a cryptographic key-agreement protocol to negotiate the keys for encryption between two end… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2016
Highly Cited
2016
In response to high-profile attacks that exploit hash function collisions, software vendors have started to phase out the use of… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
2016
2016
D2D communications facilitate proximal devices to directly communicate with each other, bypassing cellular base stations or… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
2016
2016
Abstract Peer-to-peer architectures have become very popular in the last years for a variety of services and applications they… Expand
2015
2015
This paper deals with network performance simulation and quality of Triple-play services in IP networks. Based on our designed… Expand
  • figure 1
  • table I
  • table III
  • figure 2
  • figure 3
Highly Cited
2011
Highly Cited
2011
This document defines ZRTP, a protocol for media path Diffie-Hellman exchange to agree on a session key and parameters for… Expand
  • figure 2
  • table 1
  • table 2
  • table 3
  • table 4
2009
2009
A crucial aspect when establishing a secure peer-to-peer communication channel is the negotiation of the security parameters used… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
2009
2009
When some agents want to communicate through a media stream (for example voice or video), the Real Time Protocol (RTP) is used… Expand
  • figure 1
  • figure 2
  • figure 3
Highly Cited
2008
Highly Cited
2008
Wireless networking is widespread in public places such as cafes. Unsuspecting users may become victims of attacks based on "evil… Expand
  • figure 1
  • figure 2
  • figure 5
2008
2008
Pure peer-to-peer communication, such as voice over IP (VoIP), cannot rely on third parties on security. ZRTP is a solution for… Expand
2008
2008
ZRTP is a protocol designed to set up a shared secret between two com- munication parties which is subsequently used to secure… Expand
  • figure 1
  • figure 2
  • figure 3