First page
Back
Continue
Last page
Graphics
Basic Approach
Start with traffic matrix observed by adversary
Find the true matrices that could lead to observed matrix by padding and rerouting
These determine the possibilities for true message traffic