Most of the following papers are available online in gnuzipped Postscript, some also in PDF. There is also a complete list of all our publications sorted by language and subject.
Don't forget: some proceedings are published in a later year than the conference is held.
Abstract: In present-day communication networks, the network
operator or an intruder could easily observe when, how much and with
whom the users communicate (traffic analysis), even if the users
employ end-to-end encryption. With the increasing use of ISDNs, this
becomes a severe threat.
Therefore, we summarize basic concepts to keep the recipient and
sender or at least their relationship unobservable, consider some
possible implementations and necessary hierarchical extensions, and
propose some suitable performance and reliability enhancements.
Back to SIRENE's Home or Pointers to the Outside World.