-
1
-
-
0028602929
-
Adaptive playout mechanisms for packetized audio applications in wide-area networks
-
Toronto, Ontario, Canada, June
-
R. Ramjee, J. Kurose, D. Towsley, and H. Schulzrinne, "Adaptive playout mechanisms for packetized audio applications in wide-area networks," in Proc. 13th IEEE Infocom Conference on Computer Communications (Infocom '94), pp. 680-688, Toronto, Ontario, Canada, June 1994.
-
(1994)
Proc. 13th IEEE Infocom Conference on Computer Communications (Infocom '94)
, pp. 680-688
-
-
Ramjee, R.1
Kurose, J.2
Towsley, D.3
Schulzrinne, H.4
-
2
-
-
0033690336
-
Efficient authentication and signing of multicast streams over lossy channels
-
Oakland, Calif, USA, May
-
A. Perrig, R. Canetti, J. D. Tygar, and D. Song, "Efficient authentication and signing of multicast streams over lossy channels," in Proc. IEEE Symposium on Security and Privacy, pp. 56-73, Oakland, Calif, USA, May 2000.
-
(2000)
Proc. IEEE Symposium on Security and Privacy
, pp. 56-73
-
-
Perrig, A.1
Canetti, R.2
Tygar, J.D.3
Song, D.4
-
3
-
-
0141948248
-
Digital audio presentation and compression
-
B. Furht, Ed., CRC Press, Boca Raton, Fla, USA
-
R. Westwater, "Digital audio presentation and compression," in Handbook of Multimedia Computing, B. Furht, Ed., pp. 135-147, CRC Press, Boca Raton, Fla, USA, 1999.
-
(1999)
Handbook of Multimedia Computing
, pp. 135-147
-
-
Westwater, R.1
-
4
-
-
0003679157
-
-
Prentice-Hall, Upper Saddle River, NJ, USA
-
R. Steinmetz and K. Nahrstedt, Multimedia: Computing, Communications and Applications, Innovative Technology Series. Prentice-Hall, Upper Saddle River, NJ, USA, 1995.
-
(1995)
Multimedia: Computing, Communications and Applications, Innovative Technology Series
-
-
Steinmetz, R.1
Nahrstedt, K.2
-
6
-
-
0019116956
-
Effects of packet loss on waveform coded speech
-
Atlanta, Ga, USA, October
-
N. Jayant, "Effects of packet loss on waveform coded speech," in Proc. 5th Data Communications Symposium, pp. 275-280, Atlanta, Ga, USA, October 1980.
-
(1980)
Proc. 5th Data Communications Symposium
, pp. 275-280
-
-
Jayant, N.1
-
7
-
-
84905818181
-
Packet loss effects on MPEG video sent over the public Internet
-
Bristol, UK, September
-
J. Boyce and R. Gaglianello, "Packet loss effects on MPEG video sent over the public Internet," in Proc. 6th ACM International Multimedia Conference (Multimedia '98), pp. 181-190, Bristol, UK, September 1998.
-
(1998)
Proc. 6th ACM International Multimedia Conference (Multimedia '98)
, pp. 181-190
-
-
Boyce, J.1
Gaglianello, R.2
-
8
-
-
0011122743
-
Comparing the QoS of Internet audio mechanisms via formal methods
-
A. Aldini, M. Bernardo, R. Gorrieri, and M. Roccetti, "Comparing the QoS of Internet audio mechanisms via formal methods," ACM Transactions on Modeling and Computer Simulation, vol. 11, no. 1, pp. 1-42, 2001.
-
(2001)
ACM Transactions on Modeling and Computer Simulation
, vol.11
, Issue.1
, pp. 1-42
-
-
Aldini, A.1
Bernardo, M.2
Gorrieri, R.3
Roccetti, M.4
-
9
-
-
0002953665
-
Packet audio play-out delay adjustment: Performance bounds and algorithms
-
S. B. Moon, J. Kurose, and D. Towsley, "Packet audio play-out delay adjustment: performance bounds and algorithms," ACM Multimedia Systems, vol. 6, no. 1, pp. 17-28, 1998.
-
(1998)
ACM Multimedia Systems
, vol.6
, Issue.1
, pp. 17-28
-
-
Moon, S.B.1
Kurose, J.2
Towsley, D.3
-
10
-
-
0035337204
-
Design and experimental evaluation of an adaptive playout delay control mechanism for packetized audio for use over the Internet
-
M. Roccetti, V. Ghini, G. Pau, P. Salomoni, and M. E. Bonfigli, "Design and experimental evaluation of an adaptive playout delay control mechanism for packetized audio for use over the Internet," Multimedia Tools and Applications, vol. 14, no. 1, pp. 23-53, 2001.
-
(2001)
Multimedia Tools and Applications
, vol.14
, Issue.1
, pp. 23-53
-
-
Roccetti, M.1
Ghini, V.2
Pau, G.3
Salomoni, P.4
Bonfigli, M.E.5
-
11
-
-
0003927519
-
-
Craig Potton Publishing, Nelson, New Zealand
-
N. Hager, Secret Power, Craig Potton Publishing, Nelson, New Zealand, 1996.
-
(1996)
Secret Power
-
-
Hager, N.1
-
12
-
-
0141948249
-
-
B. Dorsey, P. Rubin, A. Fingerhut, B. Soley, and P. Mullarky, "Nautilus documentation," 1996, http://www.nautilus.berlios.de/.
-
(1996)
Nautilus Documentation
-
-
Dorsey, B.1
Rubin, P.2
Fingerhut, A.3
Soley, B.4
Mullarky, P.5
-
15
-
-
0141913851
-
-
Department of Computer Science, University of Bologna, Bologna, Italy
-
M. Roccetti, V. Ghini, D. Balzi, and M. Quieti, BoAT: Bologna optimal Audio Tool, Department of Computer Science, University of Bologna, Bologna, Italy, 1999, http://radiolab.csr.unibo.it/BoAT/src.
-
(1999)
BoAT: Bologna Optimal Audio Tool
-
-
Roccetti, M.1
Ghini, V.2
Balzi, D.3
Quieti, M.4
-
16
-
-
84948963512
-
Improved fast correlation attacks using parity-check equations of weight 4 and 5
-
Advances in Cryptology - EUROCRYPT '00, International Conference on the Theory and Application of Cryptographic Techniques, Springer-Verlag, Bruges, Belgium, May
-
A. Canteaut and M. Trabbia, "Improved fast correlation attacks using parity-check equations of weight 4 and 5," in Advances in Cryptology - EUROCRYPT '00, International Conference on the Theory and Application of Cryptographic Techniques, vol. 1807 of Lecture Notes in Computer Science, pp. 573-588, Springer-Verlag, Bruges, Belgium, May 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1807
, pp. 573-588
-
-
Canteaut, A.1
Trabbia, M.2
-
17
-
-
23044522041
-
Decimation attack of stream ciphers
-
Proc. First International Conference on Cryptology in India (INDOCRYPT 2000), Springer Verlag
-
E. Filiol, "Decimation attack of stream ciphers," in Proc. First International Conference on Cryptology in India (INDOCRYPT 2000), vol. 1977 of Lecture Notes in Computer Science, pp. 31-42, Springer Verlag, 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1977
, pp. 31-42
-
-
Filiol, E.1
-
18
-
-
0141982815
-
-
Information Security Corporation, "SecurePhone Professional," 2002, http://www.infoseccorp.com.
-
(2002)
SecurePhone Professional
-
-
-
19
-
-
0141913850
-
-
EarthSpeak International LLC
-
EarthSpeak International LLC, "SecuriPhone V. 1.09," 2002, http://www.jechtech.com/securiphone.htm.
-
(2002)
SecuriPhone V. 1.09
-
-
-
20
-
-
0141948246
-
-
NetSpeak Corporation
-
NetSpeak Corporation, "NetSpeak Webphone User's Guide," 1998, http://www.k2nesoft.corn/webphone/.
-
(1998)
NetSpeak Webphone User's Guide
-
-
-
21
-
-
0141879164
-
-
Microsoft, "NetMeeting 3 Resource Kit," 1999, http://www. microsoft.com/windows/netmeeting/.
-
(1999)
NetMeeting 3 Resource Kit
-
-
-
22
-
-
0029735962
-
Control mechanisms for packet audio in the Internet
-
San Francisco, Calif, USA, March
-
J.-C. Bolot and A. Vega-Garcia, "Control mechanisms for packet audio in the Internet," in Proc. 15th IEEE Infocom Conference on Computer Communications (Infocom '96), San Francisco, Calif, USA, March 1996.
-
(1996)
Proc. 15th IEEE Infocom Conference on Computer Communications (Infocom '96)
-
-
Bolot, J.-C.1
Vega-Garcia, A.2
-
23
-
-
0003849280
-
-
Tech. Rep., University of Massachusetts, Amherst, Mass, USA
-
H. Schulzrinne, "Voice communication across the Internet: a network voice terminal," Tech. Rep., University of Massachusetts, Amherst, Mass, USA, 1992, http://www.cs.columbia.edu/̃hgs/rtp/nevot.html.
-
(1992)
Voice Communication Across the Internet: A Network Voice Terminal
-
-
Schulzrinne, H.1
-
24
-
-
0032057945
-
Successful multi-party audio communication over the Internet
-
V. Hardman, M. A. Sasse, and I. Kouvelas, "Successful multi-party audio communication over the Internet," Communications of the ACM, vol. 41, no. 5, pp. 74-80, 1998.
-
(1998)
Communications of the ACM
, vol.41
, Issue.5
, pp. 74-80
-
-
Hardman, V.1
Sasse, M.A.2
Kouvelas, I.3
-
25
-
-
0003855464
-
-
John Wiley & Sons, New York, NY, USA, 2nd edition
-
B. Schneier, Applied Cryptography, John Wiley & Sons, New York, NY, USA, 2nd edition, 1996.
-
(1996)
Applied Cryptography
-
-
Schneier, B.1
-
26
-
-
0141879162
-
An adaptive mechanism for real-time secure speech transmission over the Internet
-
H. Schulzrinne, Ed., Columbia University, New York, NY, USA, April
-
A. Aldini, R. Gorrieri, and M. Roccetti, "An adaptive mechanism for real-time secure speech transmission over the Internet," in Proc. 2nd IP-Telephony Workshop (IP-Tel '01), H. Schulzrinne, Ed., pp. 64-72, Columbia University, New York, NY, USA, April 2001.
-
(2001)
Proc. 2nd IP-telephony Workshop (IP-Tel '01)
, pp. 64-72
-
-
Aldini, A.1
Gorrieri, R.2
Roccetti, M.3
-
27
-
-
0141948244
-
Secure real time speech transmission over the Internet: Performance analysis and simulation
-
B. Waite and A. Nisanci, Eds., Society for Computer Simulation International, Vancouver, British Columbia, Canada, July
-
M. Roccetti, "Secure real time speech transmission over the Internet: performance analysis and simulation," in Proc. Summer Computer Simulation Conference (SCSC '00), B. Waite and A. Nisanci, Eds., pp. 939-944, Society for Computer Simulation International, Vancouver, British Columbia, Canada, July 2000.
-
(2000)
Proc. Summer Computer Simulation Conference (SCSC '00)
, pp. 939-944
-
-
Roccetti, M.1
-
28
-
-
0141982813
-
Adaptive control mechanisms for packet audio over the Internet
-
F. Broeckx and L. Pauwels, Eds., Society for Computer Simulation International, Antwerp, Belgium, May
-
M. Roccetti, "Adaptive control mechanisms for packet audio over the Internet," in Proc. SCS Euromedia Conference (EURO-MEDIA '00), F. Broeckx and L. Pauwels, Eds., pp. 151-155, Society for Computer Simulation International, Antwerp, Belgium, May 2000.
-
(2000)
Proc. SCS Euromedia Conference (EURO-MEDIA '00)
, pp. 151-155
-
-
Roccetti, M.1
-
29
-
-
0141879163
-
IP security protocol
-
Orlando, Fla, USA, December, Internet Drafts
-
Internet Engineering Task Force, "IP security protocol," in Proc. 43th IETF Meeting, Orlando, Fla, USA, December 1998, Internet Drafts available at http://www.ietf.org.
-
(1998)
Proc. 43th IETF Meeting
-
-
-
30
-
-
0003602325
-
-
MIT Laboratory for Computer Science and RSA Data Security
-
R. L. Rivest, The MD5 Message-Digest Algorithm, MIT Laboratory for Computer Science and RSA Data Security, 1992.
-
(1992)
The MD5 Message-digest Algorithm
-
-
Rivest, R.L.1
-
31
-
-
11244272679
-
Performance evaluation of data transmission using IPSec over IPv6 networks
-
Yokohama, Japan, July
-
S. Ariga, K. Nagahashi, M. Minami, H. Esaki, and J. Murai, "Performance evaluation of data transmission using IPSec over IPv6 networks," in Proc. The Internet Global Summit: Global Distributed Intelligence for Everyone, 10th Annual Internet Society Conference, Yokohama, Japan, July 2000.
-
(2000)
Proc. The Internet Global Summit: Global Distributed Intelligence for Everyone, 10th Annual Internet Society Conference
-
-
Ariga, S.1
Nagahashi, K.2
Minami, M.3
Esaki, H.4
Murai, J.5
-
32
-
-
0004004901
-
-
O'Reilly & Associates, Sebastopol, Calif, USA
-
S. Garfinkel, PGP: Pretty Good Privacy, O'Reilly & Associates, Sebastopol, Calif, USA, 1994.
-
(1994)
PGP: Pretty Good Privacy
-
-
Garfinkel, S.1
-
33
-
-
0020720357
-
On the security of public key protocols
-
D. Dolev and A. C. Yao, "On the security of public key protocols," IEEE Transactions on Information Theory, vol. 29, no. 2, pp. 198-208, 1983.
-
(1983)
IEEE Transactions on Information Theory
, vol.29
, Issue.2
, pp. 198-208
-
-
Dolev, D.1
Yao, A.C.2
-
34
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
R. L. Rivest, A. Shamir, and L. M. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Communications of the ACM, vol. 21, no. 2, pp. 120-126, 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.M.3
-
36
-
-
0141879159
-
A software-optimized encryption algorithm
-
P. Rogaway and D. Coppersmith, "A software-optimized encryption algorithm," Journal of Cryptology, vol. 11, no. 4, pp. 273-287, 1998.
-
(1998)
Journal of Cryptology
, vol.11
, Issue.4
, pp. 273-287
-
-
Rogaway, P.1
Coppersmith, D.2
-
37
-
-
12344327931
-
Real time cryptanalysis of A5/1 on a PC
-
New York, NY, USA, April
-
A. Biryukov, A. Shamir, and D. Wagner, "Real time cryptanalysis of A5/1 on a PC," in Proc. 7th Fast Software Encryption Workshop (FSE '00), pp. 1-18, New York, NY, USA, April 2000.
-
(2000)
Proc. 7th Fast Software Encryption Workshop (FSE '00)
, pp. 1-18
-
-
Biryukov, A.1
Shamir, A.2
Wagner, D.3
-
39
-
-
0004159439
-
-
Artech House Publishers, Norwood, Mass, USA
-
S. Redl, M. Weber, and M. Oliphant, GSM and Personal Communications Handbook, Artech House Publishers, Norwood, Mass, USA, 1998.
-
(1998)
GSM and Personal Communications Handbook
-
-
Redl, S.1
Weber, M.2
Oliphant, M.3
-
40
-
-
84955593890
-
Fast hashing on the Pentium
-
Advances in Cryptology - CRYPTO '96, 16th Annual International Cryptology Conference, N. Koblitz, Ed., Springer-Verlag, Santa Barbara, Calif, USA
-
A. Bosselaers, R. Govaerts, and J. Vandewalle, "Fast hashing on the Pentium," in Advances in Cryptology - CRYPTO '96, 16th Annual International Cryptology Conference, N. Koblitz, Ed., vol. 1109 of Lectures Notes in Computer Science, pp. 298-312, Springer-Verlag, Santa Barbara, Calif, USA, 1996.
-
(1996)
Lectures Notes in Computer Science
, vol.1109
, pp. 298-312
-
-
Bosselaers, A.1
Govaerts, R.2
Vandewalle, J.3
-
41
-
-
0344076611
-
Even faster hashing on the Pentium
-
Konstanz, Germany, May
-
A. Bosselaers, "Even faster hashing on the Pentium," in Proc. Rump Session of Eurocrypt (Eurocrypt '97), Konstanz, Germany, May 1997, http://www.esat.kuleuven.ac.be/̃bosselae/publications.html.
-
(1997)
Proc. Rump Session of Eurocrypt (Eurocrypt '97)
-
-
Bosselaers, A.1
-
42
-
-
84947902207
-
Fast software encryption: Designing encryption algorithms for optimal software speed on the Intel Pentium Processor
-
Springer-Verlag, Haifa, Israel, January
-
B. Schneier and D. Whiting, "Fast software encryption: designing encryption algorithms for optimal software speed on the Intel Pentium Processor," in Proc. 4th Fast Software Encryption Workshop (FSE '97), pp. 242-259, Springer-Verlag, Haifa, Israel, January 1997.
-
(1997)
Proc. 4th Fast Software Encryption Workshop (FSE '97)
, pp. 242-259
-
-
Schneier, B.1
Whiting, D.2
-
43
-
-
1542313506
-
Performance analysis of MD5
-
Cambridge, Mass, USA, August-September
-
J. Touch, "Performance analysis of MD5," in Proc. Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication (SIGCOMM '95), pp. 77-86, Cambridge, Mass, USA, August-September 1995.
-
(1995)
Proc. Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication (SIGCOMM '95)
, pp. 77-86
-
-
Touch, J.1
|