Sciweavers

265 search results - page 25 / 53
» Security Patterns for Voice over IP Networks
Sort
View
VTC
2010
IEEE
171views Communications» more  VTC 2010»
13 years 7 months ago
Optimum Physical-Layer Frame Size for Maximising the Application-Layer Rateless Code's Effective Throughput
— The tolerable packet-loss ratio of an Internet Protocol (IP) based wireless networks varies according to the specific services considered. File transfer for example must be er...
Tim Stevens, Robert G. Maunder, Lajos Hanzo
WISEC
2010
ACM
14 years 4 months ago
Timing-based localization of in-band wormhole tunnels in MANETs
The problem of localizing in-band wormhole tunnels in MANETs is considered. In an in-band wormhole attack, colluding attackers use a covert tunnel to create the illusion that two ...
Jinsub Kim, Dan Sterne, Rommie Hardy, Roshan K. Th...
IFIP
2007
Springer
14 years 3 months ago
Decentralized Supplementary Services for Voice-over-IP Telephony
As current Voice-over-IP (VoIP) systems encourage a direct communication between the callees they are similar in design to peerto-peer (P2P) approaches. Therefore, we introduce a f...
Christoph Spleiß, Gerald Kunzmann
JSAC
2006
112views more  JSAC 2006»
13 years 9 months ago
Performance Optimizations for Deploying VoIP Services in Mesh Networks
In the recent past, there has been a tremendous increase in the popularity of VoIP services as a result of huge growth in broadband access. The same voice-over-Internet protocol (V...
Samrat Ganguly, Vishnu Navda, Kyungtae Kim, Anand ...
LCN
2003
IEEE
14 years 2 months ago
Performance Analysis of IP Paging Protocol in IEEE 802.11 Networks
Recently, IEEE 802.11 wireless networks have been widely deployed in public areas for mobile Internet services. In the public wireless LAN systems, paging function is necessary to...
Sangheon Pack, Ved Kafle, Yanghee Choi