Search results

Jump to: navigation, search
  • ...ddle attacks and hide the called identity. Data security protocols such as SRTP rely upon a separate key management system to securely establish encryption
    4 KB (564 words) - 14:00, 13 May 2013
  • ... is disabled (authentication only) expect around 5 times less call legs on SRTP compared with plain RTP.
    4 KB (758 words) - 16:06, 31 October 2013
  • * enable [[SIP Security in Yate|security]] - allows you to use of SRTP packets for voice.
    8 KB (1,261 words) - 08:43, 4 November 2013
  • TLS and SRTP in Yate
    8 KB (1,083 words) - 11:49, 27 October 2017
  • :::Set to true to create SRTP (encrypted) session :::Encryption parameters (used by SRTP channels)
    3 KB (375 words) - 08:03, 8 June 2016
  • ; secure: bool: Generate and accept RFC 4568 security descriptors for SRTP
    25 KB (3,811 words) - 10:09, 6 July 2018
  • ...he media [http://en.wikipedia.org/wiki/Secure_Real-time_Transport_Protocol SRTP protocol] is used. This will add confidentiality, message authentication, a Using SRTP, which is a security profile for RTP will add confidentiality, message auth
    3 KB (431 words) - 08:45, 4 November 2013

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)

Personal tools
Namespaces

Variants
Views
Actions
Preface
Configuration
Administrators
Developers