Skype protocol

Results: 85



#Item
31On the Characterization of Multi-Channel Applications Walter de Donato Antonio Pescapé  Dipartimento di Informatica e Sistemistica

On the Characterization of Multi-Channel Applications Walter de Donato Antonio Pescapé Dipartimento di Informatica e Sistemistica

Add to Reading List

Source URL: wpage.unina.it

Language: English - Date: 2012-02-09 16:21:43
32On the Characterization of Multi-Channel Applications Walter de Donato and Antonio Pescapè Dipartimento di Informatica e Sistemistica, University of Napoli “Federico II” (Italy) {walter.dedonato, pescape}@unina.it

On the Characterization of Multi-Channel Applications Walter de Donato and Antonio Pescapè Dipartimento di Informatica e Sistemistica, University of Napoli “Federico II” (Italy) {walter.dedonato, pescape}@unina.it

Add to Reading List

Source URL: wpage.unina.it

Language: English - Date: 2012-02-09 16:22:05
33Open Source VoIP Traffic Monitoring Luca Deri <deri@ntop.org>  ntop.org

Open Source VoIP Traffic Monitoring Luca Deri ntop.org

Add to Reading List

Source URL: luca.ntop.org

Language: English - Date: 2011-09-22 09:35:24
34NewTek TalkShow Advanced Network Tips

NewTek TalkShow Advanced Network Tips

Add to Reading List

Source URL: www.newtek.com

Language: English - Date: 2015-02-10 19:51:26
35OSI protocols / Network packet / Network architecture / Network protocols / Internet standards / Generic Stream Encapsulation / Skype protocol / Information / Transmission Control Protocol / Consultative Committee for Space Data Systems

PHA Test Software T. Nolan July 8, 2002

Add to Reading List

Source URL: epact2.gsfc.nasa.gov

Language: English - Date: 2002-08-20 14:16:16
36I Know Where You are and What You are Sharing: Exploiting P2P Communications to Invade Users’ Privacy Stevens Le Blond∗ Chao Zhang† Arnaud Legout‡ Keith Ross† Walid Dabbous‡ arXiv:1109.4039v3 [cs.NI] 16 Oct 2

I Know Where You are and What You are Sharing: Exploiting P2P Communications to Invade Users’ Privacy Stevens Le Blond∗ Chao Zhang† Arnaud Legout‡ Keith Ross† Walid Dabbous‡ arXiv:1109.4039v3 [cs.NI] 16 Oct 2

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2011-10-17 23:19:56
37Network Platform Technology Domain  Traffic Identification for Dependable VoIP KITAMURA Tsutomu, SHIZUNO Takayuki, OKABE Toshiya, TANI Hideaki Abstract

Network Platform Technology Domain Traffic Identification for Dependable VoIP KITAMURA Tsutomu, SHIZUNO Takayuki, OKABE Toshiya, TANI Hideaki Abstract

Add to Reading List

Source URL: www.nec.com

Language: English - Date: 2013-10-01 21:33:12
38Skype / Smartphones / Teleconferencing / Portable software / IPhone / Tap / Videophone / Skype security / Skype protocol / Software / Computing / Videotelephony

659130054610000TAVVI Quick Start Guide for Skype Description: Skype for iPhone provides free Skype to Skype messaging, voice or video calls. NOTE: This guide assumes use of voice over. Step 1: Install Skype. Open app

Add to Reading List

Source URL: blindnotalone.com

Language: English - Date: 2014-08-14 11:46:39
391  SKYPE SECURITY EVALUATION Tom Berson Anagram Laboratories 18 October 2005

1 SKYPE SECURITY EVALUATION Tom Berson Anagram Laboratories 18 October 2005

Add to Reading List

Source URL: download.skype.com

Language: English - Date: 2010-07-12 07:17:40
40Encrypted Packet Forwarding in Virtualized Networks Sriram Natarajan and Tilman Wolf Department of Electrical and Computer Engineering University of Massachusetts Amherst, MA, USA

Encrypted Packet Forwarding in Virtualized Networks Sriram Natarajan and Tilman Wolf Department of Electrical and Computer Engineering University of Massachusetts Amherst, MA, USA

Add to Reading List

Source URL: www.ecs.umass.edu

Language: English - Date: 2013-12-04 11:29:23