Issue 3 • Date Third Quarter 2007
Cited by: Papers (13)
Survey of secure handoff optimization schemes for multimedia services over all-IP wireless heterogeneous networksPublication Year: 2007, Page(s):18 - 28
Cited by: Papers (11)
Cited by: Papers (25)
Cited by: Papers (92) | Patents (11)
Covert channels are used for the secret transfer of information. Encryption only protects communication from being decoded by unauthorised parties, whereas covert channels aim to hide the very existence of the communication. Initially, covert channels were identified as a security threat on monolithic systems i.e. mainframes. More recently focus has shifted towards covert channels in computer netw... View full abstract»
Cited by: Papers (126) | Patents (4)
In light of the slow deployment of IP Multicast technology on the global Internet and the explosive popularity of peer-to-peer (P2P) file-sharing applications, there has been a flurry of research activities investigating the feasibility of implementing multicasting capability at the application layer, referred to as Application Layer Multicasting (ALM), and numerous algorithms and protocols have b... View full abstract»
Aims & Scope
IEEE Communications Surveys & Tutorials is an online journal published by the IEEE Communications Society for tutorials and surveys covering all aspects of the communications field. Telecommunications technology is progressing at a rapid pace, and the IEEE Communications Society is committed to providing researchers and other professionals the information and tools to stay abreast.
Meet Our Editors
Ekram Hossain, Ph.D., P.Eng.
University of Manitoba