Sciweavers

11 search results - page 3 / 3
» The Candidate Key Protocol for Generating Secret Shared Keys...
Sort
View
JUCS
2008
147views more  JUCS 2008»
13 years 4 months ago
Security and Usability Aspects of Man-in-the-Middle Attacks on ZRTP
Abstract: ZRTP is a protocol designed to set up a shared secret between two communication parties which is subsequently used to secure the media stream (i.e. the audio data) of a V...
Martin Petraschek, Thomas Hoeher, Oliver Jung, Hel...