2011
DOI: 10.5121/ijcnc.2011.3608
|View full text |Cite
|
Sign up to set email alerts
|

Performance Evaluation of Secure Video Transmission over WIMAX

Abstract: ABSTRACT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2012
2012
2019
2019

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 12 publications
0
3
0
Order By: Relevance
“…Enea Tsanai [6,7], propose a cross-layer design that aims to improve the performance of video transmission using TCP Friendly Rate Control .Thomas Kunkelmann [8], give an overview of the security requirements of multimedia conferencing systems and of applicable security functions.For real-time video transmission, it is necessary to selectively encrypt the transmitted data.The existing methods are investigated and their advantages and disadvantages are pointed out.Chuanping Hu [9], focus on the area of public security and build an Intelligent Video and Image Analysis Evaluation Platform for Public Security (IVIAEPPS).They introduces some existing works on building this platform, as well as a video and image challenge based on it.Cha Sungyong [10], proposed a novel security evaluation framework for Military IoT Devices.…”
Section: Introductionmentioning
confidence: 99%
“…Enea Tsanai [6,7], propose a cross-layer design that aims to improve the performance of video transmission using TCP Friendly Rate Control .Thomas Kunkelmann [8], give an overview of the security requirements of multimedia conferencing systems and of applicable security functions.For real-time video transmission, it is necessary to selectively encrypt the transmitted data.The existing methods are investigated and their advantages and disadvantages are pointed out.Chuanping Hu [9], focus on the area of public security and build an Intelligent Video and Image Analysis Evaluation Platform for Public Security (IVIAEPPS).They introduces some existing works on building this platform, as well as a video and image challenge based on it.Cha Sungyong [10], proposed a novel security evaluation framework for Military IoT Devices.…”
Section: Introductionmentioning
confidence: 99%
“…It is only in recent years that constructors are building robotics progressively available and possible to the overall public. The attention of this timeline is to deliver the booklover with a general overview of robotics with a focus more on traveling robots and to give an gratitude for the inventors and innovators in this field who have helped robotics to become what it is today, the science and technology behind the design and manufacturing and application of robots [2]- [4].…”
Section: Introductionmentioning
confidence: 99%
“…WiMax with its competitive technologies LTE and 3GPP [9],UMB [10] joined into this group . The goal of these technologies is to provide anytime, anywhere high-speed broadband connectivity at an affordable cost [11] to support various applications like voice, data and video streaming [25][26][27][28].…”
Section: Introductionmentioning
confidence: 99%