Author:Veerasamy, Namosha; Cheyne, CJDate:Nov 2007Users of computer systems may often require the private transfer of messages/communications between parties across a network. However, unwanted interception/sniffing of such communications is also a possibility. An elementary stealthy transfer ...Read more