摘要 |
<p>Described embodiments relate generally to methods for communication between a first computer and a second computer over a network and to computers configured to detect a corruption of such communication. Particular embodiments apply to streamed video and/or audio data transmitted from one party to another or between both parties. Embodiments are generally concerned with communication techniques that allow determination of whether communication between the two parties may have been corrupted, for example by an unauthorised third party.</p> |