Veerasamy, NamoshaCheyne, CJ2009-05-112009-05-112007-11Veerasamy, N and Cheyne, CJ. 2007. Stealthy network transfer of data. International Journal of Computer Science and Engineering, vol 1(3), pp 201-206.1307-68841307-3699http://hdl.handle.net/10204/3365Copyright: 2007 World Academy of Science, Engineering and TechnologyUsers of computer systems may often require the private transfer of messages/communications between parties across a network. However, unwanted interception/sniffing of such communications is also a possibility. An elementary stealthy transfer scheme is therefore proposed by the author. This scheme makes use of encoding, splitting of a message and the use of a hashing algorithm to verify the correctness of the reconstructed message. For this proof-of-concept purpose, the authors have experimented with the random sending of encoded parts of a message and the construction thereof to demonstrate how data can stealthily be transferred across a network so as to prevent the obvious retrieval of dataenStealthyEncodeInterceptionData transferStealthy network transfer of dataArticleVeerasamy, N., & Cheyne, C. (2007). Stealthy network transfer of data. http://hdl.handle.net/10204/3365Veerasamy, Namosha, and CJ Cheyne "Stealthy network transfer of data." (2007) http://hdl.handle.net/10204/3365Veerasamy N, Cheyne C. Stealthy network transfer of data. 2007; http://hdl.handle.net/10204/3365.TY - Article AU - Veerasamy, Namosha AU - Cheyne, CJ AB - Users of computer systems may often require the private transfer of messages/communications between parties across a network. However, unwanted interception/sniffing of such communications is also a possibility. An elementary stealthy transfer scheme is therefore proposed by the author. This scheme makes use of encoding, splitting of a message and the use of a hashing algorithm to verify the correctness of the reconstructed message. For this proof-of-concept purpose, the authors have experimented with the random sending of encoded parts of a message and the construction thereof to demonstrate how data can stealthily be transferred across a network so as to prevent the obvious retrieval of data DA - 2007-11 DB - ResearchSpace DP - CSIR KW - Stealthy KW - Encode KW - Interception KW - Data transfer LK - https://researchspace.csir.co.za PY - 2007 SM - 1307-6884 SM - 1307-3699 T1 - Stealthy network transfer of data TI - Stealthy network transfer of data UR - http://hdl.handle.net/10204/3365 ER -