Sciweavers

54 search results - page 6 / 11
» Steganography of VoIP streams
Sort
View
IEEEMSP
2002
IEEE
177views Multimedia» more  IEEEMSP 2002»
14 years 14 days ago
Data masking: a secure-covert channel paradigm
— It is well known that encryption provides secure channels for communicating entities. However, due to lack of covertness on these channels, an eavesdropper can identify encrypt...
Regunathan Radhakrishnan, Kulesh Shanmugasundaram,...
TELETRAFFIC
2007
Springer
14 years 1 months ago
Quality-of-Service Provisioning for Multi-service TDMA Mesh Networks
Multi-service mesh networks allow existence of guaranteed delay Quality-of-Service (QoS) traffic streams such as Voice over IP and best effort QoS traffic streams such as file tr...
Petar Djukic, Shahrokh Valaee
TON
2010
139views more  TON 2010»
13 years 2 months ago
KISS: Stochastic Packet Inspection Classifier for UDP Traffic
Abstract--This paper proposes KISS, a novel Internet classification engine. Motivated by the expected raise of UDP traffic, which stems from the momentum of P2P streaming applicati...
Aleaandro Finamore, Marco Mellia, Michela Meo, Dar...
PERCOM
2005
ACM
14 years 7 months ago
SIP-Based Mobility Architecture for Next Generation Wireless Networks
Application-level protocol abstraction is required to support seamless mobility in next generation heterogeneous wireless networks. Session Initiation Protocol (SIP) proch an abst...
Nilanjan Banerjee, Sajal K. Das, Arup Acharya
TMA
2010
Springer
487views Management» more  TMA 2010»
14 years 2 months ago
End-to-End Available Bandwidth Estimation Tools, An Experimental Comparison
Abstract. The available bandwidth of a network path impacts the performance of many applications, such as VoIP calls, video streaming and P2P content distribution systems. Several ...
Emanuele Goldoni, Marco Schivi