Results 1 -
7 of
7
Efficient In-Network Adaptation of Encrypted H.264/SVC Content
, 2009
"... This paper addresses the efficient adaptation of encrypted scalable video content (H.264/SVC). RTP-based in-network adaptation schemes on a media aware network element (MANE) in an IPTV and VoD scenario are considered. Two basic alternatives to implement encryption and adaptation of H.264/SVC conten ..."
Abstract
-
Cited by 10 (5 self)
- Add to MetaCart
outperforms the SRTP-based approach. SVC-specific encryption is also superior in terms of induced end-to-end delays. The performance can even be improved by selective application of the SVC-specific encryption scheme. The results indicate that efficient adaptation of SVC-encrypted content on low
New Novel Approaches for Securing VoIP Applications
"... Abstract. SIP message authentication and SRTP key agreement are the important issue in the SIP-based VoIP service. Several secure solutions such as HTTP Digest Authentication, SSL/TLS, and S/MIME, are used for the SIP message authentication and key agreement. When the VoIP is used in the wireless en ..."
Abstract
- Add to MetaCart
Abstract. SIP message authentication and SRTP key agreement are the important issue in the SIP-based VoIP service. Several secure solutions such as HTTP Digest Authentication, SSL/TLS, and S/MIME, are used for the SIP message authentication and key agreement. When the VoIP is used in the wireless
Structural Information Implant in a Context Based Segmentation-Free HMM Handwritten Word Recognition System for Latin and Bangla Script
"... In this paper, an improvement of a 2D stochastic model based handwritten entity recognition system is described. To model the handwriting considered as being a two dimensional signal, a context based, segmentation-free Hidden Markov Model (HMM) recognition system was used. The baseline approach comb ..."
Abstract
- Add to MetaCart
In this paper, an improvement of a 2D stochastic model based handwritten entity recognition system is described. To model the handwriting considered as being a two dimensional signal, a context based, segmentation-free Hidden Markov Model (HMM) recognition system was used. The baseline approach
VoIP Networks Performance Analysis with Encryption Systems
"... Abstract—The VoIP networks as alternative method to traditional PSTN system has been implemented in a wide variety of structures with multiple protocols, codecs, software and hardware–based distributions. The use of cryptographic techniques let the users to have a secure communication, but the calcu ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
, but the calculate throughput as well as the QoS parameters are affected according to the used algorithm. This paper analyzes the VoIP throughput and the QoS parameters with different commercial encryption methods. The measurement–based approach uses lab scenarios to simulate LAN and WAN environments. Security
unknown title
"... Structural information implant in a context based segmentation-free HMM handwritten word recognition system for Latin and Bangla script In this paper, an improvement of a 2D stochastic model based handwritten entity recognition system is described. To model the handwriting considered as being a two ..."
Abstract
- Add to MetaCart
dimensional signal, a context based, segmentation-free Hidden Markov Model (HMM) recognition system was used. The baseline approach combines a Markov Random Field (MRF) and a HMM so-called Non-Symmetric Half Plane Hidden Markov Model (NSHP-HMM). To improve the results performed by this baseline system
Offline Handwritten Word Recognition Using A Hybrid Neural Network And Hidden Markov Models
, 2001
"... This paper describes an approach to combine neural network (NN) and Hidden Markov models (HMM) for solving handwritten word recognition problem. The preprocessing involves generating a segmentation graph that describes all possible ways to segment a word into letters. To recognize a word, the NN com ..."
Abstract
-
Cited by 3 (0 self)
- Add to MetaCart
present a structural training scheme to improve the performance of the recognizer. An offline handwritten word recognizer is developed based on this approach and the recognition performance of the recognizer on three isolated word image databases, namely, IRONOFF, SRTP and AWS, are presented. 1.
Probabilistic Attack Scenarios to Evaluate Policies over Communication Protocols
"... Abstract — Security is an important non-functional require-ment that should be analyzed in any system or software that is potentially exposed to security threats. Since we can’t manage what we don’t measure, it is not enough to address only the qualitative assessment of security. In this paper, we p ..."
Abstract
- Add to MetaCart
propose a novel approach that leads to a qualitative and quantitative analysis of communication protocols. Our approach is based on probabilistic model-checking and probabilistic attack scenarios. To the best of our knowledge, the present work is the first initiative that combines these two techniques