{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T04:25:52Z","timestamp":1745987152771,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":49,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642371189"},{"type":"electronic","value":"9783642371196"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-37119-6_21","type":"book-chapter","created":{"date-parts":[[2013,3,27]],"date-time":"2013-03-27T00:34:59Z","timestamp":1364344499000},"page":"324-340","source":"Crossref","is-referenced-by-count":3,"title":["QoS Aware Adaptive Security Scheme for Video Streaming in MANETs"],"prefix":"10.1007","author":[{"given":"Tahsin Arafat","family":"Reza","sequence":"first","affiliation":[]},{"given":"Michel","family":"Barbeau","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"21_CR1","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1109\/NDSS.1996.492420","volume-title":"Proceedings of the Symposium on Network and Distributed System Security (SNDSS)","author":"I. Agi","year":"1996","unstructured":"Agi, I., Gong, L.: An Empirical Study of Secure MPEG Video Transmissions. In: Proceedings of the Symposium on Network and Distributed System Security (SNDSS), pp. 137\u2013144. IEEE Computer Society, Washington, DC (1996)"},{"key":"21_CR2","doi-asserted-by":"crossref","unstructured":"Alampalayam, S., Kumar, A.: An adaptive security model for mobile agents in wireless networks. In: IEEE Global Telecommunications Conference (GLOBECOM), vol.\u00a03, pp. 1516\u20131521 (December 2003)","DOI":"10.1109\/GLOCOM.2003.1258491"},{"key":"21_CR3","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1145\/1868630.1868634","volume-title":"Proceedings of the 6th ACM Workshop on QoS and Security for Wireless and Mobile Networks (Q2SWinet)","author":"M. Alia","year":"2010","unstructured":"Alia, M., Lacoste, M., He, R., Eliassen, F.: Putting together QoS and security in autonomic pervasive systems. In: Proceedings of the 6th ACM Workshop on QoS and Security for Wireless and Mobile Networks (Q2SWinet), pp. 19\u201328. ACM, New York (2010)"},{"key":"21_CR4","doi-asserted-by":"crossref","unstructured":"Ben Mahmoud, M., Larrieu, N., Pirovano, A., Varet, A.: An adaptive security architecture for future aircraft communications. In: IEEE\/AIAA 29th Digital Avionics Systems Conference (DASC), pp. 3.E.2-1\u20133.E.2-16 (October 2010)","DOI":"10.1109\/DASC.2010.5655363"},{"key":"21_CR5","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1145\/1842752.1842792","volume-title":"Proceedings of the Fourth European Conference on Software Architecture: Companion Volume (ECSA)","author":"L. Blasi","year":"2010","unstructured":"Blasi, L., Savola, R., Abie, H., Rotondi, D.: Applicability of security metrics for adaptive security management in a universal banking hub system. In: Proceedings of the Fourth European Conference on Software Architecture: Companion Volume (ECSA), pp. 197\u2013204. ACM, New York (2010)"},{"key":"21_CR6","unstructured":"Crypto++, http:\/\/www.cryptopp.com"},{"key":"21_CR7","unstructured":"Devore, J.: Probability and Statistics for Engineering and the Sciences. Cengage Learning (2011)"},{"issue":"4","key":"21_CR8","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/COMST.2005.1593277","volume":"7","author":"D. Djenouri","year":"2005","unstructured":"Djenouri, D., Khelladi, L., Badache, A.: A survey of security issues in mobile ad hoc and sensor networks. IEEE Communications Surveys Tutorials\u00a07(4), 2\u201328 (2005)","journal-title":"IEEE Communications Surveys Tutorials"},{"key":"21_CR9","unstructured":"Dong, H., Gibson, J., Kokes, M.: SNR and bandwidth scalable speech coding. In: IEEE International Symposium on Circuits and Systems (ISCAS), vol.\u00a02, pp. II-859\u2013II-862 (2002)"},{"key":"21_CR10","doi-asserted-by":"crossref","unstructured":"Furht, B.: Encyclopedia of Multimedia. Springer Reference. Springer (2008)","DOI":"10.1007\/978-0-387-78414-4"},{"key":"21_CR11","doi-asserted-by":"crossref","unstructured":"Gibson, J., Servetti, A., Dong, H., Gersho, A., Lookabaugh, T., De Martin, J.: Selective encryption and scalable speech coding for voice communications over multi-hop wireless links. In: IEEE Military Communications Conference (MILCOM), vol.\u00a02, pp. 792\u2013798 (October-November 2004)","DOI":"10.1109\/MILCOM.2004.1494903"},{"key":"21_CR12","unstructured":"ITU-T\u00a0Rec. H.264 and ISO\/IEC 14496-10:2005 (E) (MPEG-4 AVC). H.264: Advanced video coding for generic audiovisual services. Technical report (2005)"},{"key":"21_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1007\/978-3-642-19348-4_16","volume-title":"Data Privacy Management and Autonomous Spontaneous Security","author":"R. He","year":"2011","unstructured":"He, R., Lacoste, M., Pulou, J., Leneutre, J.: A DSL for Specifying Autonomic Security Management Strategies. In: Garcia-Alfaro, J., Navarro-Arribas, G., Cavalli, A., Leneutre, J. (eds.) DPM 2010 and SETOP 2010. LNCS, vol.\u00a06514, pp. 216\u2013230. Springer, Heidelberg (2011)"},{"key":"21_CR14","unstructured":"IEEE. Part 11 Wireless Medium Access Control (MAC) and Physical Layer (PHY) specifications: Medium Access Control (MAC) Quality of Service (QoS) Enhancements. IEEE Std P802.11e\/D13.0 (2005)"},{"key":"21_CR15","doi-asserted-by":"crossref","unstructured":"Iqbal, R., Shahabuddin, S., Shirmohammadi, S.: Compressed-domain spatial adaptation resilient perceptual encryption of live H.264 video. In: 10th International Conference on Information Sciences Signal Processing and their Applications (ISSPA), pp. 472\u2013475 (May 2010)","DOI":"10.1109\/ISSPA.2010.5605442"},{"key":"21_CR16","unstructured":"ISO\/IEC. ISO\/IEC 21000-7:2007 - Information technology - Multimedia framework (MPEG-21) - Part 7: Digital Item Adaptation. Technical report, International Organization for Standardization (2007)"},{"key":"21_CR17","unstructured":"ITU-T. 5-, 4-, 3- and 2-Bits Sample Embedded Adaptive Differential Pulse Code Modulation (ADPCM) (1990)"},{"key":"21_CR18","doi-asserted-by":"crossref","unstructured":"Kamphenkel, K., Blank, M., Bauer, J., Carle, G.: Adaptive encryption for the realization of real-time transmission of sensitive medical video streams. In: International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), pp. 1\u20136 (June 2008)","DOI":"10.1109\/WOWMOM.2008.4594915"},{"issue":"6","key":"21_CR19","doi-asserted-by":"publisher","first-page":"944","DOI":"10.1109\/5.387094","volume":"83","author":"B. Macq","year":"1995","unstructured":"Macq, B., Quisquater, J.: Cryptology for digital TV broadcasting. Proceedings of the IEEE\u00a083(6), 944\u2013957 (1995)","journal-title":"Proceedings of the IEEE"},{"key":"21_CR20","unstructured":"Meyer, J., Gadegast, F.: Security mechanisms for Multimedia data with the Example MPEG-1 video, Project description of SECMPEG (2000)"},{"key":"21_CR21","doi-asserted-by":"crossref","unstructured":"Nijim, M., Ali, A.: AdSeD: An Adaptive Quality of Security Control in Disk Systems. In: 11th IEEE Intl. Conf. on Computational Sci. and Eng. (CSE), pp. 421\u2013428 (July 2008)","DOI":"10.1109\/CSE.2008.22"},{"key":"21_CR22","doi-asserted-by":"crossref","unstructured":"Oklander, B., Sidi, M.: Jitter Buffer Analysis. In: Proceedings of the 17th International Conference on Computer Communications and Networks (ICCCN), pp. 1\u20136 (August 2008)","DOI":"10.1109\/ICCCN.2008.ECP.33"},{"key":"21_CR23","doi-asserted-by":"crossref","unstructured":"Oliveira, T., Oliveira, S., Macedo, D., Nogueira, J.: An adaptive security management model for emergency networks. In: 7th Latin American Network Operations and Management Symposium (LANOMS), pp. 1\u20134 (October 2011)","DOI":"10.1109\/LANOMS.2011.6102261"},{"key":"21_CR24","doi-asserted-by":"crossref","unstructured":"Onural, L.: An Overview of Research in 3DTV. In: 14th International Workshop on Systems, Signals and Image Processing (IWSSIP), p. 3 (June 2007)","DOI":"10.1109\/IWSSIP.2007.4381083"},{"key":"21_CR25","doi-asserted-by":"crossref","unstructured":"Pereira, R., Tarouco, L.: Adaptive Multiplexing Based on E-model for Reducing Network Overhead in Voice over IP Security Ensuring Conversation Quality. In: 4th Intl. Conf. on Digital Telecommunications (ICDT), pp. 53\u201358 (July 2009)","DOI":"10.1109\/ICDT.2009.17"},{"key":"21_CR26","unstructured":"Perkins, C.: RTP: audio and video for the internet. Kaleidoscope Series. Addison-Wesley (2003)"},{"issue":"5","key":"21_CR27","doi-asserted-by":"publisher","first-page":"503","DOI":"10.1002\/wcm.73","volume":"2","author":"D. Perkins","year":"2002","unstructured":"Perkins, D., Hughes, H.: A survey on quality-of-service support for mobile ad hoc networks. Wireless Communications and Mobile Computing\u00a02(5), 503\u2013513 (2002)","journal-title":"Wireless Communications and Mobile Computing"},{"issue":"7","key":"21_CR28","doi-asserted-by":"publisher","first-page":"1144","DOI":"10.1016\/j.jss.2011.02.005","volume":"84","author":"S. Preda","year":"2011","unstructured":"Preda, S., Cuppens, F., Cuppens-Boulahia, N., Garcia-Alfaro, J., Toutain, L.: Dynamic deployment of context-aware access control policies for constrained security devices. J. Syst. Softw.\u00a084(7), 1144\u20131159 (2011)","journal-title":"J. Syst. Softw."},{"key":"21_CR29","doi-asserted-by":"crossref","unstructured":"Reza, T.: QoS Aware Adaptive Security Scheme for Video Streaming in MANETs. Master\u2019s thesis, School of Computer Science, Carleton University, Ottawa, Ontario, Canada (2012), http:\/\/people.scs.carleton.ca\/~barbeau\/Theses\/Tashin_Reza.pdf","DOI":"10.1007\/978-3-642-37119-6_21"},{"key":"21_CR30","doi-asserted-by":"crossref","unstructured":"Samad, F., Makram, S.: Adaptive security established on the requirements and resource abilities of network nodes. In: IEEE 35th Conference on Local Computer Networks (LCN), pp. 752\u2013755 (October 2010)","DOI":"10.1109\/LCN.2010.5735806"},{"issue":"9","key":"21_CR31","doi-asserted-by":"publisher","first-page":"1103","DOI":"10.1109\/TCSVT.2007.905532","volume":"17","author":"H. Schwarz","year":"2007","unstructured":"Schwarz, H., Marpe, D., Wiegand, T.: Overview of the Scalable Video Coding Extension of the H.264\/AVC Standard. IEEE Transactions on Circuits and Systems for Video Technology\u00a017(9), 1103\u20131120 (2007)","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"key":"21_CR32","unstructured":"Shnitko, A.: Adaptive security in complex information systems. In: Proc. of the 7th Korea-Russia Intl Symp. on Sci. and Tech. (KORUS), vol.\u00a02, pp. 206\u2013210 (July 2003)"},{"key":"21_CR33","unstructured":"S\u00fchring, K.: H.264\/AVC JM Reference Software, http:\/\/iphome.hhi.de\/suehring\/tml\/download\/"},{"issue":"1","key":"21_CR34","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1145\/381854.381879","volume":"25","author":"H. Son","year":"1996","unstructured":"Son, H., David, R., Thuraisingham, B.: Improving timeliness in real-time secure database systems. SIGMOD Rec.\u00a025(1), 29\u201333 (1996)","journal-title":"SIGMOD Rec."},{"key":"21_CR35","doi-asserted-by":"crossref","unstructured":"Spanos, G., Maples, T.: Performance Study of a Selective Encryption Scheme for the Security of Networked, Real-Time Video. In: Fourth International Conference on Computer Communications and Networks, pp. xviii+683 (September 1995)","DOI":"10.1109\/ICCCN.1995.540095"},{"key":"21_CR36","unstructured":"Stallings, W.: Cryptography and network security: principles and practice. Prentice Hall (2011)"},{"key":"21_CR37","doi-asserted-by":"crossref","unstructured":"Taddeo, A., Marcon, P., Ferrante, A.: Negotiation of security services: a multi-criteria decision approach. In: Proceedings of the 4th Workshop on Embedded Systems Security (WESS), pp. 4:1\u20134:9. ACM, New York (2009)","DOI":"10.1145\/1631716.1631720"},{"key":"21_CR38","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1145\/244130.244209","volume-title":"Proceedings of the Fourth ACM International Conference on Multimedia (MULTIMEDIA)","author":"L. Tang","year":"1996","unstructured":"Tang, L.: Methods for encrypting and decrypting MPEG video data efficiently. In: Proceedings of the Fourth ACM International Conference on Multimedia (MULTIMEDIA), pp. 219\u2013229. ACM, New York (1996)"},{"key":"21_CR39","doi-asserted-by":"crossref","unstructured":"Vaidya, B., Denko, M., Rodrigues, J.: Secure Framework for Voice Transmission over Multipath Wireless Ad-Hoc Network. In: IEEE Global Telecommunications Conference (GLOBECOM), pp. 1\u20136 (December 2009)","DOI":"10.1109\/WCNC.2009.4917959"},{"issue":"6","key":"21_CR40","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1145\/352029.352035","volume":"35","author":"A. Deursen Van","year":"2000","unstructured":"Van Deursen, A., Klint, P., Visser, J.: Domain-specific languages: an annotated bibliography. SIGPLAN Not.\u00a035(6), 26\u201336 (2000)","journal-title":"SIGPLAN Not."},{"key":"21_CR41","doi-asserted-by":"crossref","unstructured":"Van Deursen, D., Van Lancker, W., Van de Walle, R.: On media delivery protocols in the Web. In: IEEE Intl. Conf. on Multimedia and Expo (ICME), pp. 1028\u20131033 (July 2010)","DOI":"10.1109\/ICME.2010.5582620"},{"key":"21_CR42","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1145\/957013.957078","volume-title":"Proceedings of the Eleventh ACM International Conference on Multimedia (MULTIMEDIA)","author":"C. Venkatramani","year":"2003","unstructured":"Venkatramani, C., Westerink, P., Verscheure, O., Frossard, P.: Securing media for adaptive streaming. In: Proceedings of the Eleventh ACM International Conference on Multimedia (MULTIMEDIA), pp. 307\u2013310. ACM, New York (2003)"},{"issue":"7","key":"21_CR43","doi-asserted-by":"publisher","first-page":"560","DOI":"10.1109\/TCSVT.2003.815165","volume":"13","author":"T. Wiegand","year":"2003","unstructured":"Wiegand, T., Sullivan, G., Bjontegaard, G., Luthra, A.: Overview of the H.264\/AVC video coding standard. IEEE Transactions on Circuits and Systems for Video Technology\u00a013(7), 560\u2013576 (2003)","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"key":"21_CR44","unstructured":"Wiener, M.: Performance Comparison of Public-key Cryptosystems (1998), http:\/\/www.rsa.com\/rsalabs\/pubs\/cryptobytes.html"},{"key":"21_CR45","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1109\/ICWS.2009.141","volume-title":"Proceedings of the 2009 IEEE International Conference on Web Services (ICWS)","author":"S. Yau","year":"2009","unstructured":"Yau, S., Yin, Y., An, H.: An Adaptive Tradeoff Model for Service Performance and Security in Service-Based Systems. In: Proceedings of the 2009 IEEE International Conference on Web Services (ICWS), pp. 287\u2013294. IEEE Computer Society, Washington, DC (2009)"},{"key":"21_CR46","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1016\/j.adhoc.2010.04.007","volume":"9","author":"J. Yi","year":"2011","unstructured":"Yi, J., Adnane, A., David, S., Parrein, B.: Multipath optimized link state routing for mobile ad hoc networks. Ad Hoc Networks\u00a09, 28\u201347 (2011)","journal-title":"Ad Hoc Networks"},{"key":"21_CR47","doi-asserted-by":"crossref","unstructured":"Younis, M., Krajewski, N., Farrag, O.: Adaptive security provision for increased energy efficiency in Wireless Sensor Networks. In: IEEE 34th Conf. on Local Comp. Networks (LCN), pp. 999\u20131005 (October 2009)","DOI":"10.1109\/LCN.2009.5355022"},{"key":"21_CR48","doi-asserted-by":"crossref","unstructured":"Yu, B.: Establishement of elliptic curve cryptosystem. In: IEEE International Conference on Information Theory and Information Security (ICITIS), pp. 1165\u20131167 (December 2010)","DOI":"10.1109\/ICITIS.2010.5689767"},{"key":"21_CR49","doi-asserted-by":"crossref","unstructured":"Zou, J., Lu, K., Jin, Z.: Architecture and fuzzy adaptive security algorithm in intelligent firewall. In: Proceedings of MILCOM (MILCOM), vol.\u00a02, pp. 1145\u20131149 (October 2002)","DOI":"10.1109\/MILCOM.2002.1179639"}],"container-title":["Lecture Notes in Computer Science","Foundations and Practice of Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-37119-6_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T02:13:17Z","timestamp":1745979197000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-37119-6_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642371189","9783642371196"],"references-count":49,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-37119-6_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}