Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

BitTorrent protocol encryption

Known as: Bittorrent encryption, MSE/PE, Message Stream Encryption 
Protocol encryption (PE), message stream encryption (MSE) or protocol header encrypt (PHE) are related features of some peer-to-peer file-sharing… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
This paper introduces an improved variant of Darwinian PSO algorithm based on chaotic functions.It replaces random sequences by… Expand
  • table 1
  • table 2
  • figure 1
  • table 3
  • table 4
Is this relevant?
2017
2017
Our understanding of the world depends highly on our capacity to produce intuitive and simplified representations which can be… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table I
Is this relevant?
Highly Cited
2016
Highly Cited
2016
This paper proposes a computationally efficient optimization algorithm for segmenting colour satellite images.CS algorithm… Expand
Is this relevant?
Highly Cited
2013
Highly Cited
2013
Within the last decades, improving the quality of an underwater image has received considerable attention due to poor visibility… Expand
  • figure 1
  • figure 2
  • figure 4
  • figure 3
  • figure 5
Is this relevant?
Highly Cited
2012
Highly Cited
2012
The Tor network is designed to provide users with low-latency anonymous communications. Tor clients build circuits with publicly… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2012
2012
Starting from the orthogonal (greedy) least squares method, we build an adaptive algorithm for finding online sparse solutions to… Expand
  • table I
  • table II
  • figure 1
  • table IV
  • table V
Is this relevant?
Highly Cited
2011
Highly Cited
2011
Process mining allows for the automated discovery of process models from event logs. These models provide insights and enable… Expand
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2008
2008
Information-theoretic analysis for parallel Gaussian models of Images prescribe embedding the secret data in low and mid… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 6
  • figure 4
Is this relevant?
2007
2007
Digital image watermarking has been proposed as a method to enhance medical data security, confidentiality and integrity. Medical… Expand
  • figure 4
  • figure 5
  • figure 7
  • figure 6
  • figure 8
Is this relevant?
Highly Cited
2002
Highly Cited
2002
IPSec provides two types of security algorithms, symmetric encryption algorithms (e.g. data encryption standard DES) for… Expand
  • figure 1
  • table I
  • figure 3
  • figure 4
  • figure 5
Is this relevant?