Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 210,180,531 papers from all fields of science
Search
Sign In
Create Free Account
ZRTP
Known as:
SAS
, Short Authentication String
ZRTP (composed of Z and Real-time Transport Protocol) is a cryptographic key-agreement protocol to negotiate the keys for encryption between two end…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
38 relations
Android
Blink
C++
CSipSimple
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2016
Highly Cited
2016
Transcript Collision Attacks: Breaking Authentication in TLS, IKE and SSH
K. Bhargavan
,
G. Leurent
Network and Distributed System Security Symposium
2016
Corpus ID: 18033589
In response to high-profile attacks that exploit hash function collisions, software vendors have started to phase out the use of…
Expand
2016
2016
Secure device-to-device communications over WiFi direct
Wenlong Shen
,
Bo Yin
,
Xianghui Cao
,
L. Cai
,
Y. Cheng
IEEE Network
2016
Corpus ID: 5569740
D2D communications facilitate proximal devices to directly communicate with each other, bypassing cellular base stations or…
Expand
2016
2016
3AKEP: Triple-authenticated key exchange protocol for peer-to-peer VoIP applications
R. Pecori
,
L. Veltri
Computer Communications
2016
Corpus ID: 35755430
2015
2015
Network performance QoS estimation
J. Frnda
,
M. Voznák
,
P. Fazio
,
J. Rozhon
International Conference on Telecommunications…
2015
Corpus ID: 17271687
This paper deals with network performance simulation and quality of Triple-play services in IP networks. Based on our designed…
Expand
Highly Cited
2011
Highly Cited
2011
ZRTP: Media Path Key Agreement for Unicast Secure RTP
Philip Zimmermann
,
A. Johnston
,
J. Callas
Request for Comments
2011
Corpus ID: 183436
This document defines ZRTP, a protocol for media path Diffie-Hellman exchange to agree on a session key and parameters for…
Expand
2009
2009
A key agreement protocol for P2P VoIP applications
R. Pecori
,
L. Veltri
International Conference on Software…
2009
Corpus ID: 17755889
A crucial aspect when establishing a secure peer-to-peer communication channel is the negotiation of the security parameters used…
Expand
2009
2009
A formal security proof for the ZRTP Protocol
Riccardo Bresciani
,
A. Butterfield
International Conference for Internet Technology…
2009
Corpus ID: 14305391
When some agents want to communicate through a media stream (for example voice or video), the Real Time Protocol (RTP) is used…
Expand
Highly Cited
2008
Highly Cited
2008
Simple and effective defense against evil twin access points
Volker Roth
,
W. Polak
,
E. Rieffel
,
T. Turner
Wireless Network Security
2008
Corpus ID: 13999113
Wireless networking is widespread in public places such as cafes. Unsuspecting users may become victims of attacks based on "evil…
Expand
2008
2008
Security and Usability Aspects of Man-in-the-Middle Attacks on ZRTP
M. Petraschek
,
T. Hoeher
,
O. Jung
,
H. Hlavacs
,
W. Gansterer
Journal of universal computer science (Online)
2008
Corpus ID: 17328395
ZRTP is a protocol designed to set up a shared secret between two com- munication parties which is subsequently used to secure…
Expand
2008
2008
Peer-to-Peer Security for Mobile Real-Time Communications with ZRTP
E. Kokkonen
,
M. Matuszewski
5th IEEE Consumer Communications and Networking…
2008
Corpus ID: 27041045
Pure peer-to-peer communication, such as voice over IP (VoIP), cannot rely on third parties on security. ZRTP is a solution for…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE