{"id":"https://openalex.org/W1825342083","doi":"https://doi.org/10.17487/rfc7201","title":"Options for Securing RTP Sessions","display_name":"Options for Securing RTP Sessions","publication_year":2014,"publication_date":"2014-04-01","ids":{"openalex":"https://openalex.org/W1825342083","doi":"https://doi.org/10.17487/rfc7201","mag":"1825342083"},"language":"en","primary_location":{"id":"doi:10.17487/rfc7201","is_oa":true,"landing_page_url":"https://doi.org/10.17487/rfc7201","pdf_url":"https://www.rfc-editor.org/rfc/pdfrfc/rfc7201.txt.pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":null,"raw_type":"report"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.rfc-editor.org/rfc/pdfrfc/rfc7201.txt.pdf","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5112671821","display_name":"Magnus Westerlund","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"M. Westerlund","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5086346657","display_name":"Colin Perkins","orcid":"https://orcid.org/0000-0002-3404-8964"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"C. Perkins","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5112671821"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":"7201","issue":null,"first_page":"1","last_page":"37"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12203","display_name":"Mobile Agent-Based Network Management","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10138","display_name":"Network Traffic and Congestion Control","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/rtp-control-protocol","display_name":"RTP Control Protocol","score":0.9318585395812988},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7272939085960388},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.6058436632156372},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5718576908111572},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.5228407979011536},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4866243302822113},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.4331902861595154},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.43296459317207336},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.346712589263916}],"concepts":[{"id":"https://openalex.org/C56626739","wikidata":"https://www.wikidata.org/wiki/Q749940","display_name":"RTP Control Protocol","level":3,"score":0.9318585395812988},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7272939085960388},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.6058436632156372},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5718576908111572},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.5228407979011536},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4866243302822113},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.4331902861595154},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.43296459317207336},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.346712589263916},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.17487/rfc7201","is_oa":true,"landing_page_url":"https://doi.org/10.17487/rfc7201","pdf_url":"https://www.rfc-editor.org/rfc/pdfrfc/rfc7201.txt.pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":null,"raw_type":"report"},{"id":"pmh:oai:eprints.gla.ac.uk:93386","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4210235606","display_name":"ENLIGHTEN (Jurnal Bimbingan dan Konseling Islam)","issn_l":"2622-8912","issn":["2622-8912","2622-8920"],"is_oa":false,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"","raw_type":"Articles"},{"id":"mag:1825342083","is_oa":false,"landing_page_url":"http://eprints.gla.ac.uk/93386/","pdf_url":null,"source":{"id":"https://openalex.org/S4306528498","display_name":"RFC","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":"RFC","raw_type":null}],"best_oa_location":{"id":"doi:10.17487/rfc7201","is_oa":true,"landing_page_url":"https://doi.org/10.17487/rfc7201","pdf_url":"https://www.rfc-editor.org/rfc/pdfrfc/rfc7201.txt.pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":null,"raw_type":"report"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W1825342083.pdf","grobid_xml":"https://content.openalex.org/works/W1825342083.grobid-xml"},"referenced_works_count":15,"referenced_works":["https://openalex.org/W1618185284","https://openalex.org/W1984097153","https://openalex.org/W2099040451","https://openalex.org/W2142065509","https://openalex.org/W2171587808","https://openalex.org/W2184701512","https://openalex.org/W2186348922","https://openalex.org/W2238067778","https://openalex.org/W2241193544","https://openalex.org/W2271624102","https://openalex.org/W2289424780","https://openalex.org/W2296992447","https://openalex.org/W2299636399","https://openalex.org/W2301226339","https://openalex.org/W2498027339"],"related_works":["https://openalex.org/W2099040451","https://openalex.org/W2141767496","https://openalex.org/W1744779065","https://openalex.org/W2154708346","https://openalex.org/W1998737366","https://openalex.org/W2105376016","https://openalex.org/W2109581325","https://openalex.org/W2943965988","https://openalex.org/W1481880782","https://openalex.org/W2795099572","https://openalex.org/W2124844899","https://openalex.org/W3153498728","https://openalex.org/W2501135939","https://openalex.org/W2405435293","https://openalex.org/W2181520737","https://openalex.org/W2548694804","https://openalex.org/W1646643083","https://openalex.org/W338122911","https://openalex.org/W1489868084","https://openalex.org/W2152513558"],"abstract_inverted_index":{"The":[0,49],"Real-time":[1],"Transport":[2],"Protocol":[3,41],"(RTP)":[4],"is":[5],"used":[6],"in":[7],"a":[8,72],"large":[9],"number":[10],"of&#13;\\n":[11],"different":[12,21],"application":[13,58],"domains":[14],"and":[15,33,38,79],"environments.":[16,48],"This":[17,66],"heterogeneity&#13;\\n":[18],"implies":[19],"that":[20],"security":[22,75,90],"mechanisms":[23],"are":[24],"needed":[25],"to":[26,60,86],"provide&#13;\\n":[27],"services":[28],"such":[29],"as":[30],"confidentiality,":[31],"integrity,":[32],"source&#13;\\n":[34],"authentication":[35],"of":[36,51,71,74],"RTP":[37,39,78],"Control":[40],"(RTCP)":[42],"packets&#13;\\n":[43],"suitable":[44,64],"for":[45,56,77,82],"the":[46,62,88],"various":[47],"range":[50],"solutions":[52,76],"makes&#13;\\n":[53],"it":[54],"difficult":[55],"RTP-based":[57],"developers":[59,83],"pick":[61],"most&#13;\\n":[63],"mechanism.":[65,91],"document":[67],"provides":[68],"an":[69],"overview":[70],"number&#13;\\n":[73],"gives":[80],"guidance":[81],"on&#13;\\n":[84],"how":[85],"choose":[87],"appropriate":[89]},"counts_by_year":[{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":4},{"year":2013,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
