Author of the publication

SimViKi: a tool for the simulation of secure video communication systems

, , and . IASTED International Conference on Communications, Internet, and Information Technology (CIIT) 2006, St Thomas, US Virgin Islands, (November 2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Three Dimensional Television Services., , , , and . Encyclopedia of Multimedia, Springer, (2008)3D TV Using MPEG-2 and H.264 View Coding and Autostereoscopic Displays3D TV Using MPEG-2 and H.264 View Coding and Autostereoscopic Display, , , , and . The 2006 ACM Multimedia Conference, Santa Barbara, CA, USA, (October 2006)Design of a web-based interface for image retrieval, and . International Conference on Web Information Systems and Technologies (WEBIST), Barcelona, Spain, (March 2007)Biometric Authentication on Mobile Devices.. IEEE Secur. Priv., 13 (3): 70-73 (2015)Measuring the effectiveness of output filtering against SQL injection attacks., and . ACM Southeast Regional Conference, page 4:1-4:6. ACM, (2014)A comparison of biologically-inspired methods for unsupervised salient object detection.. ICME Workshops, page 1-4. IEEE Computer Society, (2013)Integrated global and object-based image retrieval using a multiple examples query schema, , , and . International Conference on Computer Vision Theory and Applications (VISAPP), Barcelona, Spain, (March 2007)SimViKi: a tool for the simulation of secure video communication systems, , and . IASTED International Conference on Communications, Internet, and Information Technology (CIIT) 2006, St Thomas, US Virgin Islands, (November 2006)How can the semantic web improve the acquisition and sharing of knowledge, and . International Journal of Technology, Knowledge and Society, (2006)Secure Multimedia Communications.. IEEE Secur. Priv., 8 (6): 76-79 (2010)