-
1
-
-
79955371240
-
Reputation Management in Privacy-Enhanced E-learning
-
Montreal, Canada, November 2006
-
Anwar, M., Greer, J., 2006. Reputation Management in Privacy-Enhanced E-learning. In: Proceedings of the 3rd Annual Scientific Conference of the LORNET Research Network (I2LOR-06), Montreal, Canada, November 2006.
-
(2006)
Proceedings of the 3rd Annual Scientific Conference of the LORNET Research Network (I2LOR-06)
-
-
Anwar, M.1
Greer, J.2
-
3
-
-
77955308817
-
-
Bandwidth Calculator for VOIP. AsteriskGUIDE, 2006. < http://blog.asteriskguide.com/bandcalc/bandcalc.php >.
-
(2006)
Bandwidth Calculator for VOIP
-
-
-
4
-
-
77955307845
-
Integrating Biometric Techniques with an Electronic Signature for Remote Authentication
-
April 2002
-
Bechelli, L., Bistarelli, S., Martinelli, F., Petrocchi, M., Vaccarelli, A., 2002. Integrating Biometric Techniques with an Electronic Signature for Remote Authentication. In: European Research Consortium for Informatics and Mathematics (ERCIM 2002), vol. 49, April 2002.
-
(2002)
European Research Consortium for Informatics and Mathematics (ERCIM 2002)
, vol.49
-
-
Bechelli, L.1
Bistarelli, S.2
Martinelli, F.3
Petrocchi, M.4
Vaccarelli, A.5
-
6
-
-
34748896118
-
-
RFC 3388, December 2002
-
Camarillo, G., Eriksson, G., Holler, J., Schulzrinne, H. Grouping of Media Lines in the Session Description Protocol (SDP), RFC 3388, December 2002. < http://www.ietf.org/rfc/rfc3388.txt >.
-
Grouping of Media Lines in the Session Description Protocol (SDP)
-
-
Camarillo, G.1
Eriksson, G.2
Holler, J.3
Schulzrinne, H.4
-
7
-
-
34247150784
-
-
RFC 4582, November 2006
-
Camarillo, G., Ott, J., Drage, K. The Binary Floor Control Protocol (BFCP), RFC 4582, November 2006. < http://www.ietf.org/rfc/rfc4582.txt >.
-
The Binary Floor Control Protocol (BFCP)
-
-
Camarillo, G.1
Ott, J.2
Drage, K.3
-
9
-
-
49749115270
-
VPN Analysis and New Perspective for Securing Voice over VPN Networks
-
Gosier, Guadeloupe, March 16-21, 2008
-
Diab, W.B., Tohme, S., Bassil, C., 2008. VPN Analysis and New Perspective for Securing Voice over VPN Networks. In: Fourth International Conference on Networking and Services (ICNS 2008), Gosier, Guadeloupe, March 16-21, 2008, pp. 73-78.
-
(2008)
Fourth International Conference on Networking and Services (ICNS 2008)
, pp. 73-78
-
-
Diab, W.B.1
Tohme, S.2
Bassil, C.3
-
10
-
-
77955305625
-
-
Retrieved on May 23rd, 2009
-
Digital Signature Algorithm, 2009. Wikipedia, Retrieved on May 23rd, 2009. < http://en.wikipedia.org/wiki/Digital-Signature-Algorithm >.
-
(2009)
Digital Signature Algorithm
-
-
-
11
-
-
77955303418
-
WPA, what else?
-
UNAM, Mexico City, November 27-28, 2008
-
d'Otreppe de Bouvette, T., 2008. WPA, what else? Aircrack-ng, UNAM, Mexico City, November 27-28, 2008. < http://intromision.fciencias.unam.mx/1- UNAM-08.ppt >.
-
(2008)
Aircrack-ng
-
-
D'Otreppe De Bouvette, T.1
-
12
-
-
77955304745
-
-
Retrieved on May 21st, 2009
-
Electronic Learning, 2009. Wikipedia, Retrieved on May 21st, 2009. < http://en.wikipedia.org/wiki/Electronic-learning >.
-
(2009)
Electronic Learning
-
-
-
13
-
-
77955305468
-
-
June 2005
-
Gruenauer, J., 2005. Wireless network security standard, June 2005. < http://joerg.gruenauer.doesntexist.org/WLANSecurity-V2.ppt >.
-
(2005)
-
-
Gruenauer, J.1
-
14
-
-
77955304574
-
-
H.239, retrieved on May 20th 2009
-
H.239, Wikipedia, retrieved on May 20th 2009. < http://en.wikipedia. org/wiki/H.239 >.
-
-
-
-
16
-
-
34547369684
-
Layered multicast data origin authentication and non-repudiation over lossy networks
-
ISCC'06
-
Hinard, Y., Bettahar, H., Challal, Y., Bouabdallah, A. Layered multicast data origin authentication and non-repudiation over lossy networks, ISCC'06. In: IEEE Symposium on Computers and Communications, 2006, Pula-Cagliari, Italy.
-
(2006)
IEEE Symposium on Computers and Communications, Pula-Cagliari, Italy
-
-
Hinard, Y.1
Bettahar, H.2
Challal, Y.3
Bouabdallah, A.4
-
18
-
-
77955309931
-
-
IEEE 802.11e-2005, Retrieved on May 23rd, 2009
-
IEEE 802.11e-2005, 2009. Wikipedia, Retrieved on May 23rd, 2009. < http://en.wikipedia.org/wiki/802.11e >.
-
(2009)
-
-
-
19
-
-
77955306120
-
-
IEEE 802.11i-2004, Retrieved on May 23rd, 2009
-
IEEE 802.11i-2004, 2009. Wikipedia, Retrieved on May 23rd, 2009. < http://en.wikipedia.org/wiki/802.11i >.
-
(2009)
-
-
-
21
-
-
56749129587
-
E-learning: Incorporating Information Security Governance
-
Salford, England, 2006
-
Kritzinger, E., von Solms, S.H., 2006. E-learning: Incorporating Information Security Governance. In: Issues in Informing Science and Information Technology Conference (InSITE 2006), Salford, England, 2006.
-
(2006)
Issues in Informing Science and Information Technology Conference (InSITE 2006)
-
-
Kritzinger, E.1
Von Solms, S.H.2
-
24
-
-
77955304500
-
-
Retrieved on May 22nd, 2009
-
Living List of Identity Management Terminology, ITUwiki, 2009. Retrieved on May 22nd, 2009. < http://www.ituwiki.com/index.php?title=Living-List-of- Identity-Management-Terminology >.
-
(2009)
Living List of Identity Management Terminology
-
-
-
25
-
-
84893243120
-
Analysis of Cost Structure and Business Model options for Wireless Access provisioning using Femtocell solutions
-
Rome, 18-20 September 2008
-
Markendahl, J., Makitalo, O., Werding, J., 2008. Analysis of Cost Structure and Business Model options for Wireless Access provisioning using Femtocell solutions. In: 19th European Regional ITS Conference Luiss Guido Carli University, Rome, 18-20 September 2008.
-
(2008)
19th European Regional ITS Conference Luiss Guido Carli University
-
-
Markendahl, J.1
Makitalo, O.2
Werding, J.3
-
26
-
-
77955309647
-
-
Retrieved on May 22nd, 2009
-
MLearning, 2009. Wikipedia, Retrieved on May 22nd, 2009. < http://en.wikipedia.org/wiki/M-learning >.
-
(2009)
MLearning
-
-
-
27
-
-
38549087636
-
Error Prediction Based Redundancy Control for Robust Transmission of Video over Wireless Links
-
Nemethova, O., Karner, W., Rupp, M., 2007. Error Prediction Based Redundancy Control for Robust Transmission of Video over Wireless Links, ICC 2007.
-
(2007)
ICC 2007
-
-
Nemethova, O.1
Karner, W.2
Rupp, M.3
-
28
-
-
42149130348
-
The performance and efficiency of envelope elimination and restoration transmitters for future multiple-input multiple-output wireless local area networks
-
March 2008
-
Nesimoglu, T., Parker, S.C.J., Morris, K.A., McGeehan, J.P. The performance and efficiency of envelope elimination and restoration transmitters for future multiple-input multiple-output wireless local area networks. In: IET Communications, vol. 2 (3), March 2008.
-
IET Communications
, vol.2
, Issue.3
-
-
Nesimoglu, T.1
Parker, S.C.J.2
Morris, K.A.3
McGeehan, J.P.4
-
30
-
-
84892629121
-
The Networking Perspective of Security Performance - A Measurement Study
-
Niedermayer, H., Klenk, A., Carle, G., 2006. The Networking Perspective of Security Performance - A Measurement Study, MMB 2006.
-
(2006)
MMB 2006
-
-
Niedermayer, H.1
Klenk, A.2
Carle, G.3
-
31
-
-
35248823683
-
PKASSO: Towards Seamless Authentication Providing Non-Repudiation on Resource-Constrained Devices
-
2007
-
Park, K.W., Seok, H., Park, K.H., 2007. pKASSO: Towards Seamless Authentication Providing Non-Repudiation on Resource-Constrained Devices. In: Proceedings 21st IEEE International Conference Advanced Information Networking and Applications Workshops, vol. 2, 2007, pp. 105-112.
-
(2007)
Proceedings 21st IEEE International Conference Advanced Information Networking and Applications Workshops
, vol.2
, pp. 105-112
-
-
Park, K.W.1
Seok, H.2
Park, K.H.3
-
32
-
-
84946204663
-
SU-APSD: Static IEEE 802.11e Unscheduled Automatic Power Save Delivery
-
Athens, Greece, April 2006
-
Pérez-Costa, X., Vidal, A., Camps-Mur, D., 2006. SU-APSD: Static IEEE 802.11e Unscheduled Automatic Power Save Delivery. In: European Wireless Conference (EW), Athens, Greece, April 2006.
-
(2006)
European Wireless Conference (EW)
-
-
Pérez-Costa, X.1
Vidal, A.2
Camps-Mur, D.3
-
33
-
-
33749077191
-
Security in the online e-learning environment
-
5-8 July, 2005, Kaohsiung, Taiwan
-
Raitman, R., Ngo, L., Augar, N., Zhou, W., 2005. Security in the online e-learning environment. In: Proceedings of 5th IEEE International Conference on Advanced Learning Technologies (ICALT 2005), 5-8 July, 2005, Kaohsiung, Taiwan.
-
(2005)
Proceedings of 5th IEEE International Conference on Advanced Learning Technologies (ICALT 2005)
-
-
Raitman, R.1
Ngo, L.2
Augar, N.3
Zhou, W.4
-
35
-
-
77955307225
-
-
RSA, Retrieved on May 23rd, 2009
-
RSA, 2009. Wikipedia, Retrieved on May 23rd, 2009. < http://en.wikipedia.org/wiki/RSA >.
-
(2009)
-
-
-
36
-
-
77955309520
-
-
Retrieved on May 23rd
-
SHA hash functions, Wikipedia, Retrieved on May 23rd, 2009. < http://en.wikipedia.org/wiki/SHA-hash-functions >.
-
(2009)
SHA Hash Functions
-
-
-
38
-
-
51249099814
-
Encryption vs. Performance of Infrastructure IEEE 802.11 WLANs
-
24-26 April 2008
-
Siwamogsatham, S., Srilasak, S., Limmongkol, K., Wongthavarawat, K., 2008. Encryption vs. Performance of Infrastructure IEEE 802.11 WLANs. Wireless Telecommunications Symposium (WTS 2008), 24-26 April 2008, pp. 405-408.
-
(2008)
Wireless Telecommunications Symposium (WTS 2008)
, pp. 405-408
-
-
Siwamogsatham, S.1
Srilasak, S.2
Limmongkol, K.3
Wongthavarawat, K.4
-
39
-
-
69949153611
-
Analysis of a Non-repudiation Authentication Protocol for Personal Communication Systems
-
Lafayette, Louisiana, October 1998
-
Stach, J.F., Park, E.K., 1998. Analysis of a Non-repudiation Authentication Protocol for Personal Communication Systems. In: Proceedings of 1998 IEEE International Conference on Computer Communications and Networks, Lafayette, Louisiana, October 1998, pp. 289-293.
-
(1998)
Proceedings of 1998 IEEE International Conference on Computer Communications and Networks
, pp. 289-293
-
-
Stach, J.F.1
Park, E.K.2
-
40
-
-
77955305502
-
Biometric Encryption: Emerging Privacy-Enhancing Technologies
-
October 7, 2008
-
Stoianov, A., 2008. Biometric Encryption: Emerging Privacy-Enhancing Technologies. Ontario Government Access & Privacy Workshop, October 7, 2008. < http://www.verney.ca/onapw2008/presentations/660.pdf >.
-
(2008)
Ontario Government Access & Privacy Workshop
-
-
Stoianov, A.1
-
41
-
-
77955305179
-
H.264/AVC: Overview and Intro to Fidelity-Range Extensions
-
2004
-
Topiwala, P., Jindal, M., 2004. H.264/AVC: Overview and Intro to Fidelity-Range Extensions, FastVDO, 2004. < http://www.ti.com/asia/docs/ india/tiidevconf2004/analog-symp/munish.pdf >.
-
(2004)
FastVDO
-
-
Topiwala, P.1
Jindal, M.2
-
42
-
-
77955305590
-
Video Conferencing Standards
-
Rev 2.3, Retrieved on May 23rd
-
Video Conferencing Standards, Tandberg, Application Notes, D10740, Rev 2.3, Retrieved on May 23rd, 2009. < http://www.tandberg.com/collateral/white- papers/whitepaper-Videoconferencing-standards.pdf >.
-
(2009)
Tandberg, Application Notes, D10740
-
-
-
43
-
-
77955308151
-
Voice over IP - Per Call Bandwidth Consumption
-
February
-
Voice Over IP - Per Call Bandwidth Consumption, Cisco Systems, Document ID: 7934, February 2006. < http://www.cisco.com/en/US/tech/tk652/tk698/ technologies-tech-note09186a0080094ae2.shtml >.
-
(2006)
Cisco Systems, Document ID: 7934
-
-
-
44
-
-
77955304128
-
-
VoIP Bandwidth Calculation, Newport Networks, 2005. < http://www.newport-networks.com/whitepapers/voip-bandwidth3.html >.
-
(2005)
VoIP Bandwidth Calculation
-
-
-
45
-
-
77955306217
-
-
Retrieved on May 22nd, 2009
-
Web 2.0, 2009. Wikipedia, Retrieved on May 22nd, 2009. < http://en.wikipedia.org/wiki/Web-2.0 >.
-
(2009)
Web 2.0
-
-
-
46
-
-
77955306452
-
Security & Privacy Challenges in E-Learning 2.0
-
Las Vegas
-
Weippl, E., Ebner, M., 2008. Security & Privacy Challenges in E-Learning 2.0. In: Proceedings of E-Learn 2008, Las Vegas, p. 4001-4007.
-
(2008)
Proceedings of E-Learn 2008
, pp. 4001-4007
-
-
Weippl, E.1
Ebner, M.2
-
47
-
-
33744954613
-
-
RFC 3984, February
-
Wenger, S., Hannuksela, M.M., Stockhammer, T., Westerlund, M., Singer, D. RTP Payload Format for H.264 Video, RFC 3984, February 2005. < http://www.rfc-editor.org/rfc/rfc3984.txt >.
-
(2005)
RTP Payload Format for H.264 Video
-
-
Wenger, S.1
Hannuksela, M.M.2
Stockhammer, T.3
Westerlund, M.4
Singer, D.5
-
48
-
-
77955306084
-
Video Coding Standards
-
Wiegand, T. Video Coding Standards, Digital Image Communication, 2007. < http://iphome.hhi.de/wiegand/assets/pdfs/DIC-video-coding-standards-07.pdf >.
-
(2007)
Digital Image Communication
-
-
Wiegand, T.1
-
49
-
-
77955307756
-
-
Retrieved on May 23rd, 2009
-
Wi-Fi Protected Access, 2009. Wikipedia, Retrieved on May 23rd, 2009. < http://en.wikipedia.org/wiki/Wi-Fi-Protected-Access >.
-
(2009)
Wi-Fi Protected Access
-
-
-
50
-
-
77955307067
-
-
Retrieved on May 23rd, 2009
-
Wired Equivalent Privacy, 2009. Wikipedia, Retrieved on May 23rd, 2009. < http://en.wikipedia.org/wiki/Wired-Equivalent-Privacy >.
-
(2009)
Wired Equivalent Privacy
-
-
-
51
-
-
34748884882
-
Securing BGP through Keychain-based Signatures
-
Evanston, IL, USA, June 21-22, 2007
-
Yin, H., Sheng, B., Wang, H., Pan, J., 2007. Securing BGP through Keychain-based Signatures. In: Fifteenth IEEE International Workshop on Quality of Service (IWQoS 2007), Evanston, IL, USA, June 21-22, 2007.
-
(2007)
Fifteenth IEEE International Workshop on Quality of Service (IWQoS 2007)
-
-
Yin, H.1
Sheng, B.2
Wang, H.3
Pan, J.4
-
53
-
-
63749119071
-
A Hierarchical Unequal Packet Loss Protection Scheme for Robust H.264/AVC Transmission
-
Las Vegas, Nevada, USA, January 10-13, 2009
-
Zhang, X., Peng, X.H., Wu, D., 2009. A Hierarchical Unequal Packet Loss Protection Scheme for Robust H.264/AVC Transmission. In: Proceedings of the 6th Annual IEEE Consumer Communications & Networking Conference (CCNC 2009) UASS workshop, Las Vegas, Nevada, USA, January 10-13, 2009.
-
(2009)
Proceedings of the 6th Annual IEEE Consumer Communications & Networking Conference (CCNC 2009) UASS Workshop
-
-
Zhang, X.1
Peng, X.H.2
Wu, D.3
-
54
-
-
77955303680
-
Power Efficiency in IEEE 802.11a WLAN with Cross-Layer Adaptation
-
2003
-
Zhao, J., Guo, Z., Zhu, W., 2003. Power Efficiency in IEEE 802.11a WLAN with Cross-Layer Adaptation. IEEE ICC 2003, 2003.
-
(2003)
IEEE ICC 2003
-
-
Zhao, J.1
Guo, Z.2
Zhu, W.3
-
55
-
-
84960901549
-
Object-level bit allocation and scalable rate control for MPEG-4 video coding
-
2001
-
Zhihai, H., YongKwan, K., Sanjit, K.M., 2001. Object-level bit allocation and scalable rate control for MPEG-4 video coding. In: Proceedings of Workshop and Exhibition on MPEG-4, 2001.
-
(2001)
Proceedings of Workshop and Exhibition on MPEG-4
-
-
Zhihai, H.1
Yongkwan, K.2
Sanjit, K.M.3
|