dc.contributor.author |
Haraty, Ramzi A. |
|
dc.contributor.author |
Zantout, Bassam |
|
dc.date.accessioned |
2017-01-31T12:07:43Z |
|
dc.date.available |
2017-01-31T12:07:43Z |
|
dc.date.copyright |
2010 |
en_US |
dc.date.issued |
2017-01-31 |
|
dc.identifier.issn |
1837-7823 |
en_US |
dc.identifier.uri |
http://hdl.handle.net/10725/5123 |
|
dc.description.abstract |
This paper presents two of the most common and existing techniques (BitTorrent and NetCamo) used during
data communication for avoiding traffic analysis as well as assuring data integrity. The paper also discusses
these techniques in details, as well as presents. It is important to note however, that every technology aimed at
securing data has its pros and cons. The thesis will clearly present the benefits and drawbacks of each technique
that will be discussed thoroughly including the newly introduced methodology. |
en_US |
dc.language.iso |
en |
en_US |
dc.title |
A comparative study of BitTorrent and NetCamo data communication systems |
en_US |
dc.type |
Article |
en_US |
dc.description.version |
Published |
en_US |
dc.author.school |
SAS |
en_US |
dc.author.idnumber |
199729410 |
en_US |
dc.author.department |
Computer Science and Mathematics |
en_US |
dc.description.embargo |
N/A |
en_US |
dc.relation.journal |
International Journal of Computational Intelligence and Information Security |
en_US |
dc.journal.volume |
1 |
en_US |
dc.journal.issue |
2 |
en_US |
dc.article.pages |
18-28 |
en_US |
dc.keywords |
BitTorrent |
en_US |
dc.keywords |
NetCamo |
en_US |
dc.keywords |
Traffic Analysis |
en_US |
dc.keywords |
Data integrity |
en_US |
dc.identifier.ctation |
Zantout, B., & Haraty, R. (2010). A comparative study of BitTorrent and NetCamo data communication systems. International Journal of Computational Intelligence and Information Security, 1(2), 18-28. |
en_US |
dc.author.email |
rharaty@lau.edu.lb |
en_US |
dc.identifier.tou |
http://libraries.lau.edu.lb/research/laur/terms-of-use/articles.php |
en_US |
dc.identifier.url |
https://625d5cee-a-62cb3a1a-s-sites.googlegroups.com/site/ijciisresearch/march-2010-issue/IJCIISMarch2010IssueVol.1No.2.pdf?attachauth=ANoY7cr964gi2ySOU0zhkVDZHoSrP6-3bs_rawLHLB-zxFTWNDstkF7yb4LoWP-yy_Q6gSHMN4BA_5YHwceBs4WnJtBkMtpdhOWMhDllChMjMeAiQrPUv_nqPJD_WUTiBIURpAiC3mEq03y2j-cDPnZIOV7ZArDDatKo7bWOgQzIWjElhMq6hgrcf6_maceVmU89gm4ynpVfd8rEmW0ELphtd53PowIXSYreILZvu9fziI3wEEETGVJzXtsZfUjO-XQGjm7brYHPdLDeXQvPDLzw8vflZ2B-hA%3D%3D&attredirects=0#page=18 |
en_US |
dc.orcid.id |
https://orcid.org/0000-0002-6978-3627 |
|
dc.author.affiliation |
Lebanese American University |
en_US |