THÔNG TIN TÀI LIỆU
Thông tin cơ bản
Định dạng | |
---|---|
Số trang | 92 |
Dung lượng | 1,86 MB |
Nội dung
Ngày đăng: 12/05/2022, 11:17
Nguồn tham khảo
Tài liệu tham khảo | Loại | Chi tiết | ||
---|---|---|---|---|
7. A. L. Alexander: An evaluation of Secure Real-Time Transport Protocol (SRTP) performance for VoIP ."rtgugpvgf"cv"ÐVjktf"Kpvgtpcvkqpcn"Eqphgtgpeg"qp"Pgvyqtm"cpf"U{uvgo"Ugewtkv{"422;ẹ."Wpkvgf"Uvcvgu"qh"Cogtkec."Octej"422;0 | Sách, tạp chí |
|
||
1. Kari Paul: Zoom technology security in video conferencing [Online], https://www.theguardian.com/technology/2020/apr/02/zoom-technology-security-coronavirus-video-conferencing, April 2020 | Link | |||
2. Zoom Inc: Encryption for Zoom phone [Online], https://support.zoom.us/hc/en- us/articles/360042578911-Encryption-for-Zoom-Phone, March 2021 | Link | |||
3. Microsoft: Teams Security guide [Online], https://docs.microsoft.com/en- us/microsoftteams/teams-security-guide, October 2020 | Link | |||
5. Geoffrey A. Fowler: Thousands Zoom video calls left exposed on open web, Washington Post [Online],https://www.washingtonpost.com/technology/2020/04/03/thousands-zoom-video-calls-left-exposed-open-web, April 2020 | Link | |||
6. Bill Marczak, John Scott-Railton: Move Fast and Roll Your Own Crypto [Online], Citizenlab, https://citizenlab.ca/2020/04/move-fast-roll-your-own-crypto-a-quick-look-at-the-confidentialityof-zoom-meetings/, April 2020 | Link | |||
14. IDology: One-Time Passcodes for 2FA: A Fast or Slow Death [Online], https://www.idology.com/blog/one-time-passcodes-for-two-factor-mobile-authentication-a-fast-or-slow-death/, August 2017 | Link | |||
19. Moritz Abrell: New way of communicating [Online], https://www.syss.de/fileadmin/dokumente/Publikationen/2020/2020_07_28_New_Ways_of_Communicating_When_End-to-End-Encryption_Gains_a_New_Meaning.pdf, presented at SySS conference, July 2020 | Link | |||
22. Microsoft Document: Media Quality and Network Connectivity Performance in Skype for Business Online [Online], https://docs.microsoft.com/en- us/skypeforbusiness/optimizing-your-network/media-quality-and-network-connectivity-performance, May 2021 | Link | |||
8. Z. Kartit: Applying Encryption Algorithm for Data Security in Cloud Storage, IJCSI International Journal of Computer Science Issues, Vol. 10, Issue 1, No 1, January 2013 | Khác | |||
9. A. Kulkarni: Proposed Video Encryption Algorithm versus Other Existing Algorithms: A Comparative Study, International Journal of Computer Applications (0975 ẻ 8887), Volume 65 ẻ No.1, 2013 | Khác | |||
10. Shachindra: Secure and Decentralized Live Streaming using Blockchain and IPFS, presented at Indian Institute of Technology Bombay Workshop (IITB), March 2019 | Khác | |||
11. Wachoung Zhou: An end-to-end encryption plugin for video call software, Master Thesis, Northeastern University Boston, Massachusetts, May 2017 | Khác | |||
12. T. Kunkelmann: Evaluation of Different Video Encryption Methods for a Secure Multimedia Conferencing Gateway, Lecture Notes in Computer Science, vol.1356, 2005 | Khác | |||
13. Paterson, Kenneth G: One-Time-Password-Authenticated Key Exchange, Information Security and Privacy, Lecture Notes in Computer Science. Berlin, 2010 | Khác | |||
16. Harald Alvestrand: Insertable Media Processing, presented at Technical Plenary and Advisory Committee Meetings (TPAC), September 2019 | Khác | |||
17. Saul Ibarra Corretge: The road to End-to-End Encryption in Jitsi Meet, presented at Free and Open Source Software Developers' European Meeting (FOSDEM), February 2021 | Khác | |||
18. Simon Holm, Alexander Loof: The design and architecture of a WebRTC application, Bachelor Thesis, Malmo University, Sweden, June 2019 | Khác | |||
20. Viktor Bernardo, Dulce Domingos: Web-based Fingerprinting Techniques, In Proceedings of the 13th International Joint Conference on e-Business and Telecommunications - SECRYPT, 271-282, Lisbon, Portugal, May 2016 | Khác | |||
21. Cisco System: Quality of Service (QoS) Networking in Internetworking Technology Overview, Basic QoS Architecture, chapter 46, 2003 | Khác |
HÌNH ẢNH LIÊN QUAN
TRÍCH ĐOẠN
TÀI LIỆU CÙNG NGƯỜI DÙNG
TÀI LIỆU LIÊN QUAN