dc.contributor.author |
Veerasamy, Namosha
|
|
dc.contributor.author |
Cheyne, CJ
|
|
dc.date.accessioned |
2009-05-11T06:40:59Z |
|
dc.date.available |
2009-05-11T06:40:59Z |
|
dc.date.issued |
2007-11 |
|
dc.identifier.citation |
Veerasamy, N and Cheyne, CJ. 2007. Stealthy network transfer of data. International Journal of Computer Science and Engineering, vol 1(3), pp 201-206. |
en |
dc.identifier.isbn |
1307-6884 |
|
dc.identifier.issn |
1307-3699 |
|
dc.identifier.uri |
http://hdl.handle.net/10204/3365
|
|
dc.description |
Copyright: 2007 World Academy of Science, Engineering and Technology |
en |
dc.description.abstract |
Users of computer systems may often require the private transfer of messages/communications between parties across a network. However, unwanted interception/sniffing of such communications is also a possibility. An elementary stealthy transfer scheme is therefore proposed by the author. This scheme makes use of encoding, splitting of a message and the use of a hashing algorithm to verify the correctness of the reconstructed message. For this proof-of-concept purpose, the authors have experimented with the random sending of encoded parts of a message and the construction thereof to demonstrate how data can stealthily be transferred across a network so as to prevent the obvious retrieval of data |
en |
dc.language.iso |
en |
en |
dc.publisher |
World Academy of Science, Engineering and Technology |
en |
dc.subject |
Stealthy |
en |
dc.subject |
Encode |
en |
dc.subject |
Interception |
en |
dc.subject |
Data transfer |
en |
dc.title |
Stealthy network transfer of data |
en |
dc.type |
Article |
en |
dc.identifier.apacitation |
Veerasamy, N., & Cheyne, C. (2007). Stealthy network transfer of data. http://hdl.handle.net/10204/3365 |
en_ZA |
dc.identifier.chicagocitation |
Veerasamy, Namosha, and CJ Cheyne "Stealthy network transfer of data." (2007) http://hdl.handle.net/10204/3365 |
en_ZA |
dc.identifier.vancouvercitation |
Veerasamy N, Cheyne C. Stealthy network transfer of data. 2007; http://hdl.handle.net/10204/3365. |
en_ZA |
dc.identifier.ris |
TY - Article
AU - Veerasamy, Namosha
AU - Cheyne, CJ
AB - Users of computer systems may often require the private transfer of messages/communications between parties across a network. However, unwanted interception/sniffing of such communications is also a possibility. An elementary stealthy transfer scheme is therefore proposed by the author. This scheme makes use of encoding, splitting of a message and the use of a hashing algorithm to verify the correctness of the reconstructed message. For this proof-of-concept purpose, the authors have experimented with the random sending of encoded parts of a message and the construction thereof to demonstrate how data can stealthily be transferred across a network so as to prevent the obvious retrieval of data
DA - 2007-11
DB - ResearchSpace
DP - CSIR
KW - Stealthy
KW - Encode
KW - Interception
KW - Data transfer
LK - https://researchspace.csir.co.za
PY - 2007
SM - 1307-6884
SM - 1307-3699
T1 - Stealthy network transfer of data
TI - Stealthy network transfer of data
UR - http://hdl.handle.net/10204/3365
ER -
|
en_ZA |