The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Wojciech Mazurczyk: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Wojciech Mazurczyk, Zbigniew Kotulski
    New VoIP Traffic Security Scheme with Digital Watermarking. [Citation Graph (0, 0)][DBLP]
    SAFECOMP, 2006, pp:170-181 [Conf]
  2. Wojciech Mazurczyk, Zbigniew Kotulski
    Lightweight security mechanism for PSTN-VoIP cooperation [Citation Graph (0, 0)][DBLP]
    CoRR, 2006, v:0, n:, pp:- [Journal]
  3. Wojciech Mazurczyk, Zbigniew Kotulski
    New security and control protocol for VoIP based on steganography and digital watermarking [Citation Graph (0, 0)][DBLP]
    CoRR, 2006, v:0, n:, pp:- [Journal]

  4. TrustMAS: Trusted Communication Platform for Multi-Agent Systems. [Citation Graph (, )][DBLP]


  5. Steganography of VoIP Streams. [Citation Graph (, )][DBLP]


  6. Alternative security architecture for IP Telephony based on digital watermarking [Citation Graph (, )][DBLP]


  7. SecMon: End-to-End Quality and Security Monitoring System [Citation Graph (, )][DBLP]


  8. Steganography of VoIP streams [Citation Graph (, )][DBLP]


  9. Covert Channels in SIP for VoIP signalling [Citation Graph (, )][DBLP]


  10. Analysis of a procedure for inserting steganographic data into VoIP calls [Citation Graph (, )][DBLP]


  11. Steganographic Routing in Multi Agent System Environment [Citation Graph (, )][DBLP]


  12. TrustMAS: Trusted Communication Platform for Multi-Agent Systems [Citation Graph (, )][DBLP]


  13. LACK - a VoIP Steganographic Method [Citation Graph (, )][DBLP]


  14. Hiding Information in Retransmissions [Citation Graph (, )][DBLP]


  15. Steganography in Handling Oversized IP Packets [Citation Graph (, )][DBLP]


  16. What are suspicious VoIP delays? [Citation Graph (, )][DBLP]


  17. Information Hiding Using Improper Frame Padding [Citation Graph (, )][DBLP]


  18. Stream Control Transmission Protocol Steganography [Citation Graph (, )][DBLP]


  19. Hiding Data in OFDM Symbols of IEEE 802.11 Networks [Citation Graph (, )][DBLP]


  20. Retransmission Steganography Applied [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002