BitTorrent protocol encryption

Known as: Bittorrent encryption, MSE/PE, Message Stream Encryption 
Protocol encryption (PE), message stream encryption (MSE) or protocol header encrypt (PHE) are related features of some peer-to-peer file-sharing… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1990-2017
0102019902017

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Tens of millions of wearable tness trackers are shipped yearly to consumers who routinely collect information about their… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2017
2017
Currently, digital image watermarking is widely implemented as a tool for copyright protection. Along with technological… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • figure 4
Is this relevant?
2015
2015
The main objective of the paper is to implement Savitzky Golay Smoothing Filter (SGSF) so as to apply in pre-processing of real… (More)
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • table 2
Is this relevant?
Highly Cited
2012
Highly Cited
2012
The Tor network is designed to provide users with low-latency anonymous communications. Tor clients build circuits with publicly… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2012
2012
Nowadays, Digital image acquisition and processing techniques plays a very important role in current day medical diagnosis… (More)
  • figure 1
  • figure 2
  • figure 4
  • figure 6
  • figure 5
Is this relevant?
2009
2009
Multiple antennas wireless systems can achieve large capacity at the expense of high hardware cost associated with the radio… (More)
  • figure 1
  • table I
  • table II
  • figure 2
  • table III
Is this relevant?
2009
2009
Digital medical images are very easy to be modified for illegal purposes. For example malignant nodules on lung parenchyma in… (More)
  • figure 1
  • figure 2
  • figure 3
  • table I
  • table III
Is this relevant?
Highly Cited
2007
Highly Cited
2007
Web data extraction has been an important part for many Web data analysis applications. In this paper, we formulate the data… (More)
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • table 3
Is this relevant?
2007
2007
Periodic constant-amplitude zero-autocorrelation (CAZAC) waveforms u are analyzed in terms of the discrete periodic ambiguity… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2002
2002
IPSec provides two types of security algorithms, symmetric encryption algorithms (e.g. Data Encryption Standard DES) for… (More)
  • figure 1
  • table I
  • figure 3
  • figure 4
  • figure 5
Is this relevant?