.

A comparative study of BitTorrent and NetCamo data communication systems

LAUR Repository

Show simple item record

dc.contributor.author Haraty, Ramzi A.
dc.contributor.author Zantout, Bassam
dc.date.accessioned 2017-01-31T12:07:43Z
dc.date.available 2017-01-31T12:07:43Z
dc.date.copyright 2010 en_US
dc.date.issued 2017-01-31
dc.identifier.issn 1837-7823 en_US
dc.identifier.uri http://hdl.handle.net/10725/5123
dc.description.abstract This paper presents two of the most common and existing techniques (BitTorrent and NetCamo) used during data communication for avoiding traffic analysis as well as assuring data integrity. The paper also discusses these techniques in details, as well as presents. It is important to note however, that every technology aimed at securing data has its pros and cons. The thesis will clearly present the benefits and drawbacks of each technique that will be discussed thoroughly including the newly introduced methodology. en_US
dc.language.iso en en_US
dc.title A comparative study of BitTorrent and NetCamo data communication systems en_US
dc.type Article en_US
dc.description.version Published en_US
dc.author.school SAS en_US
dc.author.idnumber 199729410 en_US
dc.author.department Computer Science and Mathematics en_US
dc.description.embargo N/A en_US
dc.relation.journal International Journal of Computational Intelligence and Information Security en_US
dc.journal.volume 1 en_US
dc.journal.issue 2 en_US
dc.article.pages 18-28 en_US
dc.keywords BitTorrent en_US
dc.keywords NetCamo en_US
dc.keywords Traffic Analysis en_US
dc.keywords Data integrity en_US
dc.identifier.ctation Zantout, B., & Haraty, R. (2010). A comparative study of BitTorrent and NetCamo data communication systems. International Journal of Computational Intelligence and Information Security, 1(2), 18-28. en_US
dc.author.email rharaty@lau.edu.lb en_US
dc.identifier.tou http://libraries.lau.edu.lb/research/laur/terms-of-use/articles.php en_US
dc.identifier.url https://625d5cee-a-62cb3a1a-s-sites.googlegroups.com/site/ijciisresearch/march-2010-issue/IJCIISMarch2010IssueVol.1No.2.pdf?attachauth=ANoY7cr964gi2ySOU0zhkVDZHoSrP6-3bs_rawLHLB-zxFTWNDstkF7yb4LoWP-yy_Q6gSHMN4BA_5YHwceBs4WnJtBkMtpdhOWMhDllChMjMeAiQrPUv_nqPJD_WUTiBIURpAiC3mEq03y2j-cDPnZIOV7ZArDDatKo7bWOgQzIWjElhMq6hgrcf6_maceVmU89gm4ynpVfd8rEmW0ELphtd53PowIXSYreILZvu9fziI3wEEETGVJzXtsZfUjO-XQGjm7brYHPdLDeXQvPDLzw8vflZ2B-hA%3D%3D&attredirects=0#page=18 en_US
dc.orcid.id https://orcid.org/0000-0002-6978-3627
dc.author.affiliation Lebanese American University en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search LAUR


Advanced Search

Browse

My Account