Search this site
Chintan Patel
  • Home
  • Articles
    • Fixed Mobile Convergence & Spectrum Management
      • Introduction to Fixed Mobile Convergence Networks
      • Maximum Channel Throughput via Cooperative Spectrum Sensing in Cognitive Radio Networks
    • GSM/EDGE/GPRS
      • Evolution of GSM and its Regulatory Policy structure
    • Long Term Evolution (LTE)
      • Emerging Aspects of LTE-Advanced towards IMT-Advanced Recognition
      • Relay Technologies for WiMAX and LTE-Advanced Mobile Systems
      • Requirements for Wireless Backhaul in LTE Networks
      • Typical Handover Scenarios in Relay Enhanced LTE Networks
      • WiMAX versus LTE: A Myth?
    • Network Security
      • Attacking the IPsec Standards in Encryption-only Configurations
      • Detection of DoS Attacks on SIP Systems
      • Digital Steganography
      • Intrusion Detection Systems in Network Security
      • Privacy and Security Aspects in RFID
    • WiMAX
      • Adaptation of Fractional Frequency Reuse in Mobile WiMAX Networks
      • Ensuring Security in WiMAX Networks
      • Integration of EPON and WiMAX for Fixed Mobile Convergence Networks
  • Blog
  • Contact me
Chintan Patel
  • Home
  • Articles
    • Fixed Mobile Convergence & Spectrum Management
      • Introduction to Fixed Mobile Convergence Networks
      • Maximum Channel Throughput via Cooperative Spectrum Sensing in Cognitive Radio Networks
    • GSM/EDGE/GPRS
      • Evolution of GSM and its Regulatory Policy structure
    • Long Term Evolution (LTE)
      • Emerging Aspects of LTE-Advanced towards IMT-Advanced Recognition
      • Relay Technologies for WiMAX and LTE-Advanced Mobile Systems
      • Requirements for Wireless Backhaul in LTE Networks
      • Typical Handover Scenarios in Relay Enhanced LTE Networks
      • WiMAX versus LTE: A Myth?
    • Network Security
      • Attacking the IPsec Standards in Encryption-only Configurations
      • Detection of DoS Attacks on SIP Systems
      • Digital Steganography
      • Intrusion Detection Systems in Network Security
      • Privacy and Security Aspects in RFID
    • WiMAX
      • Adaptation of Fractional Frequency Reuse in Mobile WiMAX Networks
      • Ensuring Security in WiMAX Networks
      • Integration of EPON and WiMAX for Fixed Mobile Convergence Networks
  • Blog
  • Contact me
  • More
    • Home
    • Articles
      • Fixed Mobile Convergence & Spectrum Management
        • Introduction to Fixed Mobile Convergence Networks
        • Maximum Channel Throughput via Cooperative Spectrum Sensing in Cognitive Radio Networks
      • GSM/EDGE/GPRS
        • Evolution of GSM and its Regulatory Policy structure
      • Long Term Evolution (LTE)
        • Emerging Aspects of LTE-Advanced towards IMT-Advanced Recognition
        • Relay Technologies for WiMAX and LTE-Advanced Mobile Systems
        • Requirements for Wireless Backhaul in LTE Networks
        • Typical Handover Scenarios in Relay Enhanced LTE Networks
        • WiMAX versus LTE: A Myth?
      • Network Security
        • Attacking the IPsec Standards in Encryption-only Configurations
        • Detection of DoS Attacks on SIP Systems
        • Digital Steganography
        • Intrusion Detection Systems in Network Security
        • Privacy and Security Aspects in RFID
      • WiMAX
        • Adaptation of Fractional Frequency Reuse in Mobile WiMAX Networks
        • Ensuring Security in WiMAX Networks
        • Integration of EPON and WiMAX for Fixed Mobile Convergence Networks
    • Blog
    • Contact me

Articles

  • Typical Handover Scenarios in Relay Enhanced LTE Networks
  • Emerging Aspects of LTE Advanced towards IMT Advanced recognition
  • Relay Technologies for WiMAX and LTE-Advanced Mobile Systems
  • Adaptation of Fractional Frequency Reuse in Mobile WiMAX Networks
  • Integration of EPON and WiMAX for Fixed Mobile Convergence Networks
  • Introduction to Fixed Mobile Convergence Networks
  • Requirements for Wireless Backhaul in LTE Networks
  • WiMAX versus LTE: A Myth?
  • Intrusion Detection Systems in Network Security
  • Detection of DoS attacks on SIP Systems
  • Digital Steganography
  • Evolution of GSM and its Regulatory Policy Structure
  • Privacy and Security Aspects in RFID
  • Attacking IPsec Standards in Encryption-only Configurations
  • Ensuring Security in WiMAX Networks
  • Maximum Channel Throughput via Cooperative Spectrum Sensing in Cognitive Radio Networks
Report abuse
Page details
Page updated
Report abuse