Search results
- ...ddle attacks and hide the called identity. Data security protocols such as SRTP rely upon a separate key management system to securely establish encryption4 KB (564 words) - 14:00, 13 May 2013
- ... is disabled (authentication only) expect around 5 times less call legs on SRTP compared with plain RTP.4 KB (758 words) - 16:06, 31 October 2013
- * enable [[SIP Security in Yate|security]] - allows you to use of SRTP packets for voice.8 KB (1,261 words) - 08:43, 4 November 2013
- TLS and SRTP in Yate8 KB (1,083 words) - 11:49, 27 October 2017
- :::Set to true to create SRTP (encrypted) session :::Encryption parameters (used by SRTP channels)3 KB (375 words) - 08:03, 8 June 2016
- ; secure: bool: Generate and accept RFC 4568 security descriptors for SRTP25 KB (3,811 words) - 10:09, 6 July 2018
- ...he media [http://en.wikipedia.org/wiki/Secure_Real-time_Transport_Protocol SRTP protocol] is used. This will add confidentiality, message authentication, a Using SRTP, which is a security profile for RTP will add confidentiality, message auth3 KB (431 words) - 08:45, 4 November 2013