Requirements and Analysis of Media Security Key Management Protocols

Abstract: A number of proposals have been published to address the need of securing media traffic. A summary of the proposals available at that time is available in the appendix of this document. Different assumptions, requirements, and usage environments justify every one of them. This document aims to summarize the discussed media security requirements. A comparison of the requirements against the individual proposals is provided.

The draft can be found here.

Leave a Reply

Your email address will not be published. Required fields are marked *