Login / Signup
Using SIP identity to prevent man-in-the-middle attacks on ZRTP.
Oliver Jung
Martin Petraschek
Thomas Hoeher
Ivan Gojmerac
Published in:
Wireless Days (2008)
Keyphrases
</>
sql injection
countermeasures
traffic analysis
malicious attacks
terrorist attacks
security vulnerabilities
computer security
security protocols
neural network
security threats
identity management
java card
denial of service attacks
ddos attacks
watermarking scheme
distributed systems
digital images