WASET
	@article{(Open Science Index):https://publications.waset.org/pdf/1907,
	  title     = {Stealthy Network Transfer of Data},
	  author    = {N. Veerasamy and  C. J. Cheyne},
	  country	= {},
	  institution	= {},
	  abstract     = {Users of computer systems may often require the
private transfer of messages/communications between parties across
a network. Information warfare and the protection and dominance of
information in the military context is a prime example of an
application area in which the confidentiality of data needs to be
maintained. The safe transportation of critical data is therefore often
a vital requirement for many private communications. However,
unwanted interception/sniffing of communications is also a
possibility. An elementary stealthy transfer scheme is therefore
proposed by the authors. This scheme makes use of encoding,
splitting of a message and the use of a hashing algorithm to verify the
correctness of the reconstructed message. For this proof-of-concept
purpose, the authors have experimented with the random sending of
encoded parts of a message and the construction thereof to
demonstrate how data can stealthily be transferred across a network
so as to prevent the obvious retrieval of data.},
	    journal   = {International Journal of Information and Communication Engineering},
	  volume    = {1},
	  number    = {10},
	  year      = {2007},
	  pages     = {3043 - 3048},
	  ee        = {https://publications.waset.org/pdf/1907},
	  url   	= {https://publications.waset.org/vol/10},
	  bibsource = {https://publications.waset.org/},
	  issn  	= {eISSN: 1307-6892},
	  publisher = {World Academy of Science, Engineering and Technology},
	  index 	= {Open Science Index 10, 2007},
	}