Works matching IS 15094553 AND DT 2011 AND VI 2011 AND IP 1
Results: 12
Review of Distributed Beamforming.
- Published in:
- Journal of Telecommunications & Information Technology, 2011, v. 2011, n. 1, p. 78, doi. 10.26636/jtit.2011.1.1137
- By:
- Publication type:
- Article
Adaptation of the Kademila Routing for Tactical Networks.
- Published in:
- Journal of Telecommunications & Information Technology, 2011, v. 2011, n. 1, p. 69, doi. 10.26636/jtit.2011.1.1136
- By:
- Publication type:
- Article
Web Services Efficiency in Disadvantaged Environment.
- Published in:
- Journal of Telecommunications & Information Technology, 2011, v. 2011, n. 1, p. 62, doi. 10.26636/jtit.2011.1.1135
- By:
- Publication type:
- Article
Authentication and Authorization of Users and Services in Dynamic Military SOA Environments.
- Published in:
- Journal of Telecommunications & Information Technology, 2011, v. 2011, n. 1, p. 54, doi. 10.26636/jtit.2011.1.1134
- By:
- Publication type:
- Article
A New Short Signature Scheme with Random Oracle from Bilinear Pairings.
- Published in:
- Journal of Telecommunications & Information Technology, 2011, v. 2011, n. 1, p. 5, doi. 10.26636/jtit.2011.1.1125
- By:
- Publication type:
- Article
Success Factors for SOA Implementation in Network Centric Environment.
- Published in:
- Journal of Telecommunications & Information Technology, 2011, v. 2011, n. 1, p. 43, doi. 10.26636/jtit.2011.1.1133
- By:
- Publication type:
- Article
Tunneling Activities Detection Using Machine Learning Techniques.
- Published in:
- Journal of Telecommunications & Information Technology, 2011, v. 2011, n. 1, p. 37, doi. 10.26636/jtit.2011.1.1132
- By:
- Publication type:
- Article
Anomaly Detection Framework Based on Matching Pursuit for Network Security Enhancement.
- Published in:
- Journal of Telecommunications & Information Technology, 2011, v. 2011, n. 1, p. 32, doi. 10.26636/jtit.2011.1.1131
- By:
- Publication type:
- Article
The INTERSECTION Framework: Applied Security for Heterogeneous Networks.
- Published in:
- Journal of Telecommunications & Information Technology, 2011, v. 2011, n. 1, p. 22, doi. 10.26636/jtit.2011.1.1130
- By:
- Publication type:
- Article
Authentication in VoIP Telephony with Use of the Echo Hiding Method.
- Published in:
- Journal of Telecommunications & Information Technology, 2011, v. 2011, n. 1, p. 17, doi. 10.26636/jtit.2011.1.1127
- By:
- Publication type:
- Article
Network Management in Non-classified Data Hiding System Using Master Resident over Hidden Layer.
- Published in:
- Journal of Telecommunications & Information Technology, 2011, v. 2011, n. 1, p. 11, doi. 10.26636/jtit.2011.1.1126
- By:
- Publication type:
- Article
Preface.
- Published in:
- Journal of Telecommunications & Information Technology, 2011, v. 2011, n. 1, p. 1
- By:
- Publication type:
- Article