All Stories

  1. A Novel Approach to Quality-of-Service Provisioning in Trusted Relay Quantum Key Distribution Networks
  2. Usability of Destination-Sequenced Distance Vector Routing Protocol Routes
  3. Risk Assessment Approach to Estimate Security of Cryptographic Keys in Quantum Cryptography
  4. Security Verification of Artificial Neural Networks Used to Error Correction in Quantum Cryptography
  5. The Value of Geographic Locations Submitted by Internet Users
  6. Macroscopic Geographical Speed of Data Transmission in European Internet
  7. Analysis of the Public Channel of Quantum Key Distribution Link
  8. Implementation of quantum key distribution network simulation module in the network simulator NS-3
  9. Evaluation of Device-Independent Internet Spatial Location
  10. Multicast Steganography Using Routing Protocols
  11. QSIP: A Quantum Key Distribution Signaling Protocol
  12. Toward Designing a Quantum Key Distribution Network Simulation Model
  13. Impact of packet size variation in overlay quantum key distribution network
  14. On using multiple routing metrics with destination sequenced distance vector protocol for MultiHop wireless ad hoc networks
  15. Calculation of the Key Length for Quantum Key Distribution
  16. Hiding data in SIP session
  17. Vulnerabilities in GSM technology and feasibility of selected attacks
  18. Calculation of key reduction for B92 QKD protocol
  19. Detection of cardiac activity changes from human speech
  20. Predictive model for determining the quality of a call
  21. Neural network classifier of attacks in IP telephony
  22. Impact of human emotions on physiological characteristics
  23. Interactive video audio system: communication server for INDECT portal
  24. Using DNS amplification DDoS attack for hiding data
  25. Creating Covert Channel Using SIP
  26. Prediction model of QoS for Triple play services
  27. Recognizing emotions from human speech using 2-D neural classifier and influence the selection of input parameters on its accuracy