1. Introduction
Applications like Internet telephony, video on demand or life video streaming gain more and more in importance. For example, a video-conference system allows to discuss in real-time with colleagues of a remote branch, without having to travel. Though interactive applications pose strict requirements with regard to end-to-end latency (maximally 400 ms) and jitter, it is often not possible to integrate security services as data authentication, integrity and confidentiality.