M
Mats Näslund
Researcher at Ericsson
Publications - 183
Citations - 4628
Mats Näslund is an academic researcher from Ericsson. The author has contributed to research in topics: Authentication & Node (networking). The author has an hindex of 32, co-authored 182 publications receiving 4551 citations. Previous affiliations of Mats Näslund include University of São Paulo.
Papers
More filters
The Secure Real-time Transport Protocol (SRTP)
TL;DR: This document describes the Secure Real-time Transport Protocol (SRTP), a profile of the real-time transport protocol which can provide confidentiality, message authentication, and replay protection to the RTP traffic and to the control traffic for RTP, the Real- time Transport Control Protocol (RTCP).
Proceedings ArticleDOI
A Quantitative Analysis of Current Security Concerns and Solutions for Cloud Computing
Nelson Mimura Gonzalez,Charles Christian Miers,Fernando Frota Redígolo,Tereza Cristina Melo de Brito Carvalho,Marcos A. Simplicio,Mats Näslund,Makan Pourzandi +6 more
TL;DR: This article identifies and classify the main security concerns and solutions in cloud computing, and proposes a taxonomy of security in cloud Computing, giving an overview of the current status ofSecurity in this emerging technology.
MIKEY: Multimedia Internet KEYing
TL;DR: This document describes a key management scheme that can be used for real-time applications (both for peer-to-peer communication and group communication) and in particular, its use to support the Secure Real-time Transport Protocol is described in detail.
Patent
Lawful interception of end-to-end encrypted data traffic
TL;DR: In this article, a method of facilitating the lawful interception of an IP session between two or more terminals 12,13, wherein said session uses encryption to secure traffic is proposed. But the method is limited to a single IP session, and the pre-master key becomes known to each of the terminals involved in the IP session and to the network node 5,8.
Patent
Monitoring of digital content provided from a content provider over a network
TL;DR: In this article, a logging agent (150) generates and stores information concerning usage of the digital content individually for each usage to be monitored, the generated information is entered in a usage log (170, 175), either stored in the client system (10) or at a trusted party.