Filter your results
- 6
- 1
- 7
- 7
- 1
- 2
- 1
- 3
- 1
- 7
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
End-to-End Delay Performance for VoIP on LTE System in Access Network1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.162-172, ⟨10.1007/978-3-642-36818-9_17⟩
Conference papers
hal-01480171v1
|
||
|
Utility-Based Analytical Model for Representing User QoE9th Wired/Wireless Internet Communications (WWIC), Jun 2011, Vilanova i la Geltrú, Spain. pp.323-337, ⟨10.1007/978-3-642-21560-5_27⟩
Conference papers
hal-01583631v1
|
||
|
Pit Stop for an Audio Steganography Algorithm14th International Conference on Communications and Multimedia Security (CMS), Sep 2013, Magdeburg,, Germany. pp.123-134, ⟨10.1007/978-3-642-40779-6_10⟩
Conference papers
hal-01492814v1
|
||
|
Effective Packet Loss Estimation on VoIP Jitter BufferNetworking Workshops (NETWORKING), May 2012, Prague, Czech Republic. pp.157-162, ⟨10.1007/978-3-642-30039-4_21⟩
Conference papers
hal-01533580v1
|
||
|
Extracting Evidence Related to VoIP Calls7th Digital Forensics (DF), Jan 2011, Orlando, FL, United States. pp.221-228, ⟨10.1007/978-3-642-24212-0_17⟩
Conference papers
hal-01569552v1
|
||
|
Cryptanalysis of a SIP Authentication Scheme12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.134-143, ⟨10.1007/978-3-642-24712-5_11⟩
Conference papers
hal-01596196v1
|
||
Analysis of token and ticket based mechanisms for current voIP security issues and enhancement proposalCMC 2010 : 11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, May 2010, Linz, Austria. pp.154 - 165
Conference papers
hal-00565730v1
|