暂无分享,去创建一个
Markus Fiedler | Wojciech Mazurczyk | Zbigniew Kotulski | Radu Lupu | Charlott Eliasson | Tomasz Ciszkowski
[1] Thomas J. Walsh,et al. Security Considerations for Voice Over IP Systems , 2005 .
[2] Markus Fiedler. Euro-NGI D.JRA.6.1.1 : State-of-the-art with regards to user-perceived Quality of Service and quality feedback , 2004 .
[3] Takehiro Takahashi,et al. An assessment of VoIP covert channel threats , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.
[4] M. Fiedler,et al. Generic communication requirements of ITS-related mobile services as basis for seamless communications , 2005, Next Generation Internet Networks, 2005.
[5] Markus Fiedler,et al. Measurement and Analysis of Skype VoIP Traffic in 3G UMTS Systems , 2006 .
[6] Markus Fiedler,et al. The Throughput Utility Function: Assessing Network Impact on Mobile Services , 2005, EuroNGI Workshop.
[7] Markus Fiedler,et al. Network Selection Box: An Implementation of Seamless Communication , 2006, EuroNGI Workshop.
[8] T. Ciszkowski,et al. Distributed Reputation Management in Collaborative Environment of Anonymous MANETs , 2007, EUROCON 2007 - The International Conference on "Computer as a Tool".
[9] Stefan Chevul,et al. ON APPLICATION-PERCEIVED QUALITY OF SERVICE IN WIRELESS NETWORKS , 2006 .
[10] Wojciech Mazurczyk,et al. New VoIP Traffic Security Scheme with Digital Watermarking , 2006, SAFECOMP.
[11] Guillermo Morales-Luna,et al. Information Hiding through Noisy Channels , 2001, Information Hiding.
[12] Markus Fiedler,et al. Measurement of Application-Perceived Throughput of an E2E VPN Connection Using a GPRS Network , 2005, EuroNGI Workshop.
[13] Markus Fiedler,et al. Identification of performance degradation in IP networks using throughput statistics , 2003 .
[14] Valérie Issarny,et al. Enhanced Reputation Mechanism for Mobile Ad Hoc Networks , 2004, iTrust.
[15] Walter Bender,et al. Techniques for Data Hiding , 1996, IBM Syst. J..
[16] Jakob Nielsen,et al. Usability engineering , 1997, The Computer Science and Engineering Handbook.
[17] Steven J. Murdoch,et al. Embedding Covert Channels into TCP/IP , 2005, Information Hiding.
[18] Zbigniew Kotulski,et al. ANAP: Anonymous Authentication Protocol in Mobile Ad hoc Networks , 2006, ArXiv.
[19] Markus Fiedler,et al. A P2P-Based Framework for Distributed Network Management , 2005, EuroNGI Workshop.
[20] Wojciech Mazurczyk,et al. New security and control protocol for VoIP based on steganography and digital watermarking , 2006, Ann. UMCS Informatica.
[21] Markus Fiedler,et al. Quantification of Quality of Experience for Edge-Based Applications , 2007, ITC.