Найдено 2
How to implement ISDNs without user observability---Someremarks
Pfitzmann A.
Association for Computing Machinery (ACM)
ACM SIGSAC Review, 2007, цитирований: 1, Обзор, doi.org, Abstract
In present day communication networks, the network operator or an intruder could easily observe when, how much and with whom the users communicate (traffic analysis), even if the users employ end-to-end encryption. With the increasing use of ISDNs, this becomes a severe threat.Therefore, we summarize basic concepts to keep the recipient and sender or at least their relationship unobservable, consider some possible implementations and necessary hierarchical extensions, and propose and evaluate some suitable performance and reliability enhancements.
Preposterous opinions about computer security
Neugent B.
Association for Computing Machinery (ACM)
ACM SIGSAC Review, 2007, цитирований: 2, Обзор, doi.org, Abstract
The ideas have already been distilled to extreme purity and potency; further distillation could result in dangerous volatility.
Cobalt Бета
ru en