A comparative study of BitTorrent and NetCamo data communication systems
This paper presents two of the most common and existing techniques (BitTorrent and NetCamo) used during data communication for avoiding traffic analysis as well as assuring data integrity. The paper also discusses these techniques in details, as well as presents. It is important to note however, tha...
Saved in:
| Main Author: | |
|---|---|
| Other Authors: | |
| Format: | article |
| Published: |
2010
|
| Online Access: | http://hdl.handle.net/10725/5123 http://libraries.lau.edu.lb/research/laur/terms-of-use/articles.php https://625d5cee-a-62cb3a1a-s-sites.googlegroups.com/site/ijciisresearch/march-2010-issue/IJCIISMarch2010IssueVol.1No.2.pdf?attachauth=ANoY7cr964gi2ySOU0zhkVDZHoSrP6-3bs_rawLHLB-zxFTWNDstkF7yb4LoWP-yy_Q6gSHMN4BA_5YHwceBs4WnJtBkMtpdhOWMhDllChMjMeAiQrPUv_nqPJD_WUTiBIURpAiC3mEq03y2j-cDPnZIOV7ZArDDatKo7bWOgQzIWjElhMq6hgrcf6_maceVmU89gm4ynpVfd8rEmW0ELphtd53PowIXSYreILZvu9fziI3wEEETGVJzXtsZfUjO-XQGjm7brYHPdLDeXQvPDLzw8vflZ2B-hA%3D%3D&attredirects=0#page=18 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Internet
http://hdl.handle.net/10725/5123http://libraries.lau.edu.lb/research/laur/terms-of-use/articles.php
https://625d5cee-a-62cb3a1a-s-sites.googlegroups.com/site/ijciisresearch/march-2010-issue/IJCIISMarch2010IssueVol.1No.2.pdf?attachauth=ANoY7cr964gi2ySOU0zhkVDZHoSrP6-3bs_rawLHLB-zxFTWNDstkF7yb4LoWP-yy_Q6gSHMN4BA_5YHwceBs4WnJtBkMtpdhOWMhDllChMjMeAiQrPUv_nqPJD_WUTiBIURpAiC3mEq03y2j-cDPnZIOV7ZArDDatKo7bWOgQzIWjElhMq6hgrcf6_maceVmU89gm4ynpVfd8rEmW0ELphtd53PowIXSYreILZvu9fziI3wEEETGVJzXtsZfUjO-XQGjm7brYHPdLDeXQvPDLzw8vflZ2B-hA%3D%3D&attredirects=0#page=18