Stop the war!
Остановите войну!
for scientists:
default search action
Telecommunication Systems, Volume 45
Volume 45, Number 1, September 2010
- Shiguo Lian, Peter P. Stavroulakis:
Introduction to special issue on secure multimedia services. 1-2 - Malek Barhoush, J. William Atwood:
Requirements for enforcing digital rights management in multicast content distribution. 3-20 - Shiguo Lian:
Secure service convergence based on scalable media coding. 21-35 - Jong Hyuk Park:
Subscriber authentication technology of AAA mechanism for mobile IPTV service offer. 37-45 - Joan Tomàs-Buliart, Marcel Fernandez, Miguel Soriano:
Traitor tracing over YouTube video service - proof of concept. 47-60 - Ge Zhang, Simone Fischer-Hübner, Sven Ehlert:
Blocking attacks on SIP VoIP proxies caused by external processing. 61-76 - Manel Guerrero Zapata, Ruken Zilan, José M. Barceló-Ordinas, Kemal Bicakci, Bülent Tavli:
The future of security in Wireless Multimedia Sensor Networks - A position paper. 77-91
Volume 45, Numbers 2-3, October 2010
- Krzysztof Szczypiorski:
Guest editorial. 93-94 - Sinan Hatahet, Abdelmadjid Bouabdallah, Yacine Challal:
A new worm propagation threat in BitTorrent: modeling and analysis. 95-109 - Ali Noorollahi Ravari, Jafar Haadi Jafarian, Morteza Amini, Rasool Jalili:
GTHBAC: A Generalized Temporal History Based Access Control Model. 111-125 - Ali Ahmed, Ning Zhang:
Towards the realisation of context-risk-aware access control in pervasive computing. 127-137 - Elaine Hulitt, Rayford B. Vaughn:
Information system security compliance to FISMA standard: a quantitative measure. 139-152 - Wojciech Mazurczyk, Józef Lubacz:
LACK - a VoIP steganographic method. 153-163 - Nicholas M. Boers, Pawel Gburzynski, Ioanis Nikolaidis, Wladek Olesinski:
Developing wireless sensor network applications in a virtual environment. 165-176 - Aneta Poniszewska-Maranda:
Conception approach of access control in heterogeneous information systems using UML. 177-190 - Tomasz Mrugalski, Józef Wozniak:
Analysis of IPv6 handovers in IEEE 802.16 environment. 191-204 - Konrad S. Wrona, Geir Hallingstad:
Real-time automated risk assessment in protected core networking. 205-214 - Xun Dong, John A. Clark, Jeremy L. Jacob:
Defending the weakest link: phishing websites detection by analysing user behaviours. 215-226 - Josip Zoric:
Analysis of service platforms by a portfolio approach. 227-247 - Gang Uk Hwang, Fumio Ishizaki:
Packet level performance analysis of a packet scheduler exploiting multiuser diversity. 249-258
Volume 45, Number 4, December 2010
- Lin Guan, Xingang Wang, Irfan Awan:
Performance modelling and evaluation of telecommunication systems. 259-260 - Anna Izabel J. Tostes Ribeiro, Carlos R. Storck, Fátima de L. P. Duarte-Figueiredo:
CAC-RD: an UMTS call admission control. 261-274 - R. A. Baloch, Irfan-Ullah Awan, Geyong Min:
A mathematical model for wireless channel allocation and handoff schemes. 275-287 - Hongxing Li, Edward Chan, Guihai Chen:
AEETC - adaptive energy-efficient timing control in wireless networks with network coding. 289-301 - Aruna Thangaraj, Qing-An Zeng, Xiaolong Li:
Performance analysis of the IEEE 802.11e wireless networks with TCP ACK prioritization. 303-312 - Xin Guan, Lin Guan, Xin Gang Wang, Tomoaki Ohtsuki:
A new load balancing and data collection algorithm for energy saving in wireless sensor networks. 313-322 - Shuangmei Cheng, Jianhua Li, Lei Zhu, Chuanxiong Guo:
Time-domain sending rate and response function of eXplicit Control Protocol. 323-328 - Cheolgi Kim, Kyungtae Kang, Dong Kun Noh, Junhee Ryu, Joongsoo Ma:
Timing evaluation of MAC-layer error control on ARM9-based mobile embedded systems. 329-337
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.