Abstract

Copyright: © 2012 Cortes P. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. Nowadays, modern telecommunication networks allow intercommunicating persons, computers, systems, enterprises, financial operations, etc. throughout the world. Such networks transport huge amounts of information that can be for leisure, training, academic, or commercial activities supporting sensitive data in many occasions. Sometimes, all this information must reach quickly its destination, but other times the encryption protocol protecting the information is a more required issue, or also the efficient use of the capacity of the network avoiding traffic jams can be mandatory.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call