ACM SIGSAC Review, volume 5, issue 1, pages 19-21
How to implement ISDNs without user observability---Someremarks
Andreas Pfitzmann
1
Publication type: Journal Article
Publication date: 2007-06-08
Hardware and Architecture
Computer Networks and Communications
Software
Abstract
In present day communication networks, the network operator or an intruder could easily observe when, how much and with whom the users communicate (traffic analysis), even if the users employ end-to-end encryption. With the increasing use of ISDNs, this becomes a severe threat.Therefore, we summarize basic concepts to keep the recipient and sender or at least their relationship unobservable, consider some possible implementations and necessary hierarchical extensions, and propose and evaluate some suitable performance and reliability enhancements.
Found
Are you a researcher?
Create a profile to get free access to personal recommendations for colleagues and new articles.