scispace - formally typeset
M

Mats Näslund

Researcher at Ericsson

Publications -  183
Citations -  4628

Mats Näslund is an academic researcher from Ericsson. The author has contributed to research in topics: Authentication & Node (networking). The author has an hindex of 32, co-authored 182 publications receiving 4551 citations. Previous affiliations of Mats Näslund include University of São Paulo.

Papers
More filters

The Secure Real-time Transport Protocol (SRTP)

TL;DR: This document describes the Secure Real-time Transport Protocol (SRTP), a profile of the real-time transport protocol which can provide confidentiality, message authentication, and replay protection to the RTP traffic and to the control traffic for RTP, the Real- time Transport Control Protocol (RTCP).
Proceedings ArticleDOI

A Quantitative Analysis of Current Security Concerns and Solutions for Cloud Computing

TL;DR: This article identifies and classify the main security concerns and solutions in cloud computing, and proposes a taxonomy of security in cloud Computing, giving an overview of the current status ofSecurity in this emerging technology.

MIKEY: Multimedia Internet KEYing

TL;DR: This document describes a key management scheme that can be used for real-time applications (both for peer-to-peer communication and group communication) and in particular, its use to support the Secure Real-time Transport Protocol is described in detail.
Patent

Lawful interception of end-to-end encrypted data traffic

TL;DR: In this article, a method of facilitating the lawful interception of an IP session between two or more terminals 12,13, wherein said session uses encryption to secure traffic is proposed. But the method is limited to a single IP session, and the pre-master key becomes known to each of the terminals involved in the IP session and to the network node 5,8.
Patent

Monitoring of digital content provided from a content provider over a network

TL;DR: In this article, a logging agent (150) generates and stores information concerning usage of the digital content individually for each usage to be monitored, the generated information is entered in a usage log (170, 175), either stored in the client system (10) or at a trusted party.