Author of the publication

Fusion of digital television, broadband Internet and mobile communications - Part II: Future service scenarios.

, , , , , , , , , , , , and . Int. J. Satellite Communications Networking, 25 (4): 409-440 (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Recent Advancements in Digital Forensics., , and . IEEE Security & Privacy, 15 (6): 10-11 (2017)Optimization of a peer-to-peer system for efficient content replication., and . European Journal of Operational Research, 196 (2): 423-433 (2009)Exploiting IP telephony with silence suppression for hidden data transfers., , , , and . Computers & Security, (2018)Supporting Vertical Handover by Using a Pastry Peer-to-Peer Overlay Network., , , , and . PerCom Workshops, page 163-167. IEEE Computer Society, (2006)IPv6 Covert Channels in the Wild., , and . CECC, page 10:1-10:6. ACM, (2019)The energy impact of security mechanisms in modern mobile devices., and . Netw. Secur., 2012 (2): 11-14 (2012)Guest Editorial: Multidisciplinary Solutions to Modern Cybersecurity Challenges., , , and . J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 12 (4): 1-3 (2021)Using SIP as P2P Technology., and . African J. of Inf. & Commun. Technology, (2005)Steganography in Modern Smartphones and Mitigation Techniques., and . IEEE Communications Surveys and Tutorials, 17 (1): 334-357 (2015)Design of a peer-to-peer system for optimized content replication., and . Computer Communications, 30 (16): 3107-3116 (2007)