Date: Fri, 29 Mar 2024 09:40:47 +0100 (CET) Message-ID: <1237789270.4159.1711701647773@static.9.57.119.168.clients.your-server.de> Subject: Exported From Confluence MIME-Version: 1.0 Content-Type: multipart/related; boundary="----=_Part_4158_1242608888.1711701647770" ------=_Part_4158_1242608888.1711701647770 Content-Type: text/html; charset=UTF-8 Content-Transfer-Encoding: quoted-printable Content-Location: file:///C:/exported.html
Formal verification proving the security of ZRTP= DH mode | The ZRTP Protocol - Analysis=
of the Diffie-Hellman mode |
Riccardo Bresciani Trinity College, Dublin, I= reland |
An evaluation of ZRTP protocol showing resistanc= e to most cryptographic attacks | ZRTP Protocol - Security Considerations | Riccardo Bresciani Ecole Normale Superiore De= Cachan, France |
Independent forensics analysis on how ZRTP secur= e voice communications | Forensics Analysis of zFone and ZRTP | Detica, Information Intelligence London,= UK |
Coverage of possible attack scenarios if authent= ication is not properly managed | Security and Us= ability Aspects of Man-In-The-Middle attacks in ZRTP | Telecommunication Research Group University o= f Vienna, Austria |
Research by Nokia showing how to apply ZRTP for = securing Mobile communications | Peer to Peer Security for Mobile Real-Time Commun= ications with ZRTP | Nokia Research Center, Finland |
Analysis on the residual performance impact on u= sing VoIP with signaling and voice encryption | VoIP Networks Performance Analysis with Encryption Systems= a> | GISSIC Investigation Group, Military University = Nueva Granada, Bogot=C3=A0, Colombia |
A lot of useful information about ZRTP, it's fea= ture and how it does compare with other security protocols. | zFon= e FAQ | Philip Zimmermann, San Francisco, USA |
An in depth overview of major Voice Encryption p= rotocols including ZRTP | Major Voice Security protocol Review | Fabio Pietrosanti, Milan, Italy |
Early papers showing zFone capabilities in encry= pting voice communications with ZRTP protocol | zFone: A new approach for securing voice com= munications | Samuel Sotillo, East Carolina University, USA |
Early papers evaluating different weakness in Vo= IP protocols, explaining various risk mitigations with ZRTP prptocol | Information Security Issues in Voice over Internet Protocol | Jonathan Clark, School of Electrical Engineering= , Georgia Institute of Technology, USA |