Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

How to implement ISDNs without user observability---Someremarks

How to implement ISDNs without user observability---Someremarks In present day communication networks, the network operator or an intruder could easily observe when, how much and with whom the users communicate (traffic analysis), even if the users employ end-to-end encryption. With the increasing use of ISDNs, this becomes a severe threat.Therefore, we summarize basic concepts to keep the recipient and sender or at least their relationship unobservable, consider some possible implementations and necessary hierarchical extensions, and propose and evaluate some suitable performance and reliability enhancements. http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png ACM SIGSAC Review Association for Computing Machinery

How to implement ISDNs without user observability---Someremarks

ACM SIGSAC Review , Volume 5 (1) – Jan 1, 1987

Loading next page...
 
/lp/association-for-computing-machinery/how-to-implement-isdns-without-user-observability-someremarks-qG11mZI5Et

References

References for this paper are not available at this time. We will be adding them shortly, thank you for your patience.

Publisher
Association for Computing Machinery
Copyright
Copyright © 1987 by ACM Inc.
ISSN
0277-920X
DOI
10.1145/25048.1059521
Publisher site
See Article on Publisher Site

Abstract

In present day communication networks, the network operator or an intruder could easily observe when, how much and with whom the users communicate (traffic analysis), even if the users employ end-to-end encryption. With the increasing use of ISDNs, this becomes a severe threat.Therefore, we summarize basic concepts to keep the recipient and sender or at least their relationship unobservable, consider some possible implementations and necessary hierarchical extensions, and propose and evaluate some suitable performance and reliability enhancements.

Journal

ACM SIGSAC ReviewAssociation for Computing Machinery

Published: Jan 1, 1987

There are no references for this article.