Multiple Escrow Agents in VoIP
暂无分享,去创建一个
[1] W. W. PETERSONt,et al. Cyclic Codes for Error Detection * , 2022 .
[2] Victor Shoup,et al. Practical Threshold Signatures , 2000, EUROCRYPT.
[3] Romanidis Evripidis. Lawful Interception and Countermeasures : In the era of Internet Telephony , 2008 .
[4] Moti Yung,et al. How to share a function securely , 1994, STOC '94.
[5] H. L. Nguyen,et al. RSA Threshold Cryptography , 2005 .
[6] Jari Arkko,et al. MIKEY: Multimedia Internet KEYing , 2004, RFC.
[7] Lionel M. Ni,et al. Multiple-key cryptography-based distributed certificate authority in mobile ad-hoc networks , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..
[8] Andrew S. Tanenbaum,et al. Computer networks, third edition , 1996 .
[9] Johan Bilien. Key Agreement for Secure Voice over IP , 2003 .
[10] Mark Handley,et al. SIP: Session Initiation Protocol , 1999, RFC.
[11] Henning Schulzrinne,et al. RTP: A Transport Protocol for Real-Time Applications , 1996, RFC.
[12] Matthew K. Franklin,et al. Efficient generation of shared RSA keys , 2001, JACM.
[13] Wade Trappe,et al. Introduction to Cryptography with Coding Theory , 2002 .
[14] Peter G. Neumann,et al. The risks of key recovery, key escrow, and trusted third-party encryption , 1997, World Wide Web J..
[15] Mats Näslund,et al. The Secure Real-time Transport Protocol (SRTP) , 2004, RFC.
[16] Matt Blaze,et al. Protocol failure in the escrowed encryption standard , 1994, CCS '94.
[17] Erik Eliasson. Secure Internet telephony : design, implementation and performance measurements , 2006 .
[18] A. Michael Froomkin. The Metaphor is the Key: Cryptography, the Clipper Chip and the Constitution , 1995 .
[19] J. Sobolewski. Cyclic redundancy check , 2003 .
[20] Tal Rabin,et al. A Simplified Approach to Threshold and Proactive RSA , 1998, CRYPTO.