50 relations: Acronym, Android (operating system), C (programming language), C++, Circuit Switched Data, Communications satellite, Cryptographic hash function, CSipSimple, Diffie–Hellman key exchange, Distributed hash table, DrayTek, Encryption, Enhanced Data Rates for GSM Evolution, FreeSWITCH, General Packet Radio Service, H.323, Integrated Services Digital Network, Internet Draft, Internet Engineering Task Force, Java (programming language), Jingle (protocol), Jitsi, Jon Callas, Key (cryptography), Key-agreement protocol, Linphone, Linux, Man-in-the-middle attack, Microsoft Windows, National Security Agency, National Security Agency academic publications, Open Whisper Systems, Opportunistic encryption, Phil Zimmermann, Phoner, Public key infrastructure, Real-time Transport Protocol, Satellite modem, Secure Real-time Transport Protocol, Secure Shell, Session Initiation Protocol, Signal (software), Signal Protocol, Twinkle (software), Ultra high frequency, UMTS, Very high frequency, Voice over IP, Wi-Fi, Zooko Wilcox-O'Hearn.
An acronym is a word or name formed as an abbreviation from the initial components in a phrase or a word, usually individual letters (as in NATO or laser) and sometimes syllables (as in Benelux).
Android is a mobile operating system developed by Google, based on a modified version of the Linux kernel and other open source software and designed primarily for touchscreen mobile devices such as smartphones and tablets.
C (as in the letter ''c'') is a general-purpose, imperative computer programming language, supporting structured programming, lexical variable scope and recursion, while a static type system prevents many unintended operations.
C++ ("see plus plus") is a general-purpose programming language.
In communications, Circuit Switched Data (CSD) is the original form of data transmission developed for the time-division multiple access (TDMA)-based mobile phone systems like Global System for Mobile Communications (GSM).
A communications satellite is an artificial satellite that relays and amplifies radio telecommunications signals via a transponder; it creates a communication channel between a source transmitter and a receiver at different locations on Earth.
A cryptographic hash function is a special class of hash function that has certain properties which make it suitable for use in cryptography.
CSipSimple is a Voice over Internet Protocol (VoIP) application for Google Android operating system using the Session Initiation Protocol (SIP).
Diffie–Hellman key exchange (DH)Synonyms of Diffie–Hellman key exchange include.
A distributed hash table (DHT) is a class of a decentralized distributed system that provides a lookup service similar to a hash table: (key, value) pairs are stored in a DHT, and any participating node can efficiently retrieve the value associated with a given key.
DrayTek is a manufacturer of broadband CPE (Customer Premises Equipment), including firewalls, VPN devices, routers and wireless LAN devices.
In cryptography, encryption is the process of encoding a message or information in such a way that only authorized parties can access it and those who are not authorized cannot.
Enhanced Data rates for GSM Evolution (EDGE) (also known as Enhanced GPRS (EGPRS), or IMT Single Carrier (IMT-SC), or Enhanced Data rates for Global Evolution) is a digital mobile phone technology that allows improved data transmission rates as a backward-compatible extension of GSM.
FreeSWITCH is a free and open source application server for real-time communication, WebRTC, telecommunications, video and Voice over Internet Protocol (VoIP).
General Packet Radio Service (GPRS) is a packet oriented mobile data standard on the 2G and 3G cellular communication network's global system for mobile communications (GSM).
H.323 is a recommendation from the ITU Telecommunication Standardization Sector (ITU-T) that defines the protocols to provide audio-visual communication sessions on any packet network.
Integrated Services Digital Network (ISDN) is a set of communication standards for simultaneous digital transmission of voice, video, data, and other network services over the traditional circuits of the public switched telephone network.
An Internet Draft (I-D) is a document published by the Internet Engineering Task Force (IETF) containing preliminary technical specifications, results of networking-related research, or other technical information.
The Internet Engineering Task Force (IETF) develops and promotes voluntary Internet standards, in particular the standards that comprise the Internet protocol suite (TCP/IP).
Java is a general-purpose computer-programming language that is concurrent, class-based, object-oriented, and specifically designed to have as few implementation dependencies as possible.
Jingle is an extension to the Extensible Messaging and Presence Protocol (XMPP) which adds peer-to-peer (P2P) session control (signaling) for multimedia interactions such as in Voice over IP (VoIP) or videoconferencing communications.
Jitsi Desktop (formerly SIP Communicator) is a free and open source multiplatform voice (VoIP), videoconferencing and instant messaging application for Windows, Linux, Mac OS X and Android.
Jon Callas is an American computer security expert, software engineer, user experience designer, and technologist who is the co-founder and former CTO of the global encrypted communications service Silent Circle.
In cryptography, a key is a piece of information (a parameter) that determines the functional output of a cryptographic algorithm.
In cryptography, a key-agreement protocol is a protocol whereby two or more parties can agree on a key in such a way that both influence the outcome.
Linphone (contraction of Linux phone) is a free voice over IP softphone, SIP client and service.
Linux is a family of free and open-source software operating systems built around the Linux kernel.
In cryptography and computer security, a man-in-the-middle attack (MITM) is an attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other.
Microsoft Windows is a group of several graphical operating system families, all of which are developed, marketed, and sold by Microsoft.
The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence.
The United States' National Security Agency (NSA), an intelligence agency of the federal government, publishes many documents on the history and technology of cryptology, cryptography, and cryptanalysis through various publications.
Open Whisper Systems (abbreviated OWS) is a software organization that was founded by Moxie Marlinspike in 2013.
Opportunistic encryption (OE) refers to any system that, when connecting to another system, attempts to encrypt the communications channel, otherwise falling back to unencrypted communications.
Philip R. "Phil" Zimmermann, Jr. (born February 12, 1954) is the creator of Pretty Good Privacy (PGP), the most widely used email encryption software in the world.
Phoner and PhonerLite are softphone applications for Windows operating systems available as freeware.
A public key infrastructure (PKI) is a set of roles, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates and manage public-key encryption.
The Real-time Transport Protocol (RTP) is a network protocol for delivering audio and video over IP networks.
A satellite modem or satmodem is a modem used to establish data transfers using a communications satellite as a relay.
The Secure Real-time Transport Protocol (SRTP) is a Real-time Transport Protocol (RTP) profile, intended to provide encryption, message authentication and integrity, and replay attack protection to the RTP data in both unicast and multicast applications.
Secure Shell (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network.
The Session Initiation Protocol (SIP) is a communications protocol for signaling and controlling multimedia communication sessions in applications of Internet telephony for voice and video calls, in private IP telephone systems, as well as in instant messaging over Internet Protocol (IP) networks.
Signal is an encrypted communications app for Android and iOS.
The Signal Protocol (formerly known as the TextSecure Protocol) is a non-federated cryptographic protocol that can be used to provide end-to-end encryption for voice calls, video calls, and instant messaging conversations.
Twinkle is a free and open-source app for voice communications over Voice over IP (VoIP) protocol.
Ultra high frequency (UHF) is the ITU designation for radio frequencies in the range between 300 megahertz (MHz) and 3 gigahertz (GHz), also known as the decimetre band as the wavelengths range from one meter to one decimeter.
The Universal Mobile Telecommunications System (UMTS) is a third generation mobile cellular system for networks based on the GSM standard.
Very high frequency (VHF) is the ITU designation for the range of radio frequency electromagnetic waves (radio waves) from 30 to 300 megahertz (MHz), with corresponding wavelengths of ten to one meter.
Voice over Internet Protocol (also voice over IP, VoIP or IP telephony) is a methodology and group of technologies for the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks, such as the Internet.
Wi-Fi or WiFi is technology for radio wireless local area networking of devices based on the IEEE 802.11 standards.
Zooko Wilcox-O'Hearn (born Bryce Wilcox May 13, 1974 in Phoenix, Arizona), is an American Colorado-based computer security specialist, cypherpunk, and CEO of zCash.