Home | History | Annotate | Download | only in doc

Lines Matching full:applications

139    (Sections 9) for unicast and multicast RTP applications (Section 11).
1458 the first key derivation is REQUIRED. Further applications of the
1574 bits. (Requiring n/128, rounded up, applications of AES.)
1680 Multiple applications of the key derivation function are optional,
1687 Multiple applications of the key derivation function provide
1786 certain applications and link technologies, additional bytes
1797 2. Authentication is impractical for applications that use data
1807 A short tag is secure for a restricted set of applications. Consider
1831 Certainly not all SRTP or telephony applications meet the criteria
1842 likely to be used for telephony applications [MIKEY] [KINK] and
1843 multicast applications [GDOI]. This section provides guidance for
2173 Note: in most typical applications (assuming at least one RTCP packet
2201 default tag size is 80 bits, it is, for the applications in mind,
2372 Applications with stateless codecs might be robust against this type
2373 of attack, but for other, more complex applications these attacks may
2421 message authentication, it may be useful for some applications.
2521 Use of the MKI for re-keying is RECOMMENDED for most applications
2666 "RTP: A Transport Protocol for Real-time Applications", RFC
3175 copyrights, patents or patent applications, or other proprietary