ResearchSpace

Stealthy network transfer of data

Show simple item record

dc.contributor.author Veerasamy, Namosha
dc.contributor.author Cheyne, CJ
dc.date.accessioned 2009-05-11T06:40:59Z
dc.date.available 2009-05-11T06:40:59Z
dc.date.issued 2007-11
dc.identifier.citation Veerasamy, N and Cheyne, CJ. 2007. Stealthy network transfer of data. International Journal of Computer Science and Engineering, vol 1(3), pp 201-206. en
dc.identifier.isbn 1307-6884
dc.identifier.issn 1307-3699
dc.identifier.uri http://hdl.handle.net/10204/3365
dc.description Copyright: 2007 World Academy of Science, Engineering and Technology en
dc.description.abstract Users of computer systems may often require the private transfer of messages/communications between parties across a network. However, unwanted interception/sniffing of such communications is also a possibility. An elementary stealthy transfer scheme is therefore proposed by the author. This scheme makes use of encoding, splitting of a message and the use of a hashing algorithm to verify the correctness of the reconstructed message. For this proof-of-concept purpose, the authors have experimented with the random sending of encoded parts of a message and the construction thereof to demonstrate how data can stealthily be transferred across a network so as to prevent the obvious retrieval of data en
dc.language.iso en en
dc.publisher World Academy of Science, Engineering and Technology en
dc.subject Stealthy en
dc.subject Encode en
dc.subject Interception en
dc.subject Data transfer en
dc.title Stealthy network transfer of data en
dc.type Article en
dc.identifier.apacitation Veerasamy, N., & Cheyne, C. (2007). Stealthy network transfer of data. http://hdl.handle.net/10204/3365 en_ZA
dc.identifier.chicagocitation Veerasamy, Namosha, and CJ Cheyne "Stealthy network transfer of data." (2007) http://hdl.handle.net/10204/3365 en_ZA
dc.identifier.vancouvercitation Veerasamy N, Cheyne C. Stealthy network transfer of data. 2007; http://hdl.handle.net/10204/3365. en_ZA
dc.identifier.ris TY - Article AU - Veerasamy, Namosha AU - Cheyne, CJ AB - Users of computer systems may often require the private transfer of messages/communications between parties across a network. However, unwanted interception/sniffing of such communications is also a possibility. An elementary stealthy transfer scheme is therefore proposed by the author. This scheme makes use of encoding, splitting of a message and the use of a hashing algorithm to verify the correctness of the reconstructed message. For this proof-of-concept purpose, the authors have experimented with the random sending of encoded parts of a message and the construction thereof to demonstrate how data can stealthily be transferred across a network so as to prevent the obvious retrieval of data DA - 2007-11 DB - ResearchSpace DP - CSIR KW - Stealthy KW - Encode KW - Interception KW - Data transfer LK - https://researchspace.csir.co.za PY - 2007 SM - 1307-6884 SM - 1307-3699 T1 - Stealthy network transfer of data TI - Stealthy network transfer of data UR - http://hdl.handle.net/10204/3365 ER - en_ZA


Files in this item

This item appears in the following Collection(s)

Show simple item record