Adrian Chadd writes: > On Wed, Oct 21, 2009, Alex Balashov wrote: > > I was not aware that tools or techniques to do this are widespread or > > highly functional in a way that would get them adopted in an Internet > > access control application of a national scope. > > > > Tell me more? > > It's been a while since I tinkered with this for fun, but a quick abuse > of google gives one relatively useful starting paper: > > http://ccr.sigcomm.org/online/files/p7-v37n1b-crotti.pdf
A lot of research papers on what is or isn't possible in traffic analysis are linked from http://freehaven.net/anonbib/topic.html#Traffic_20analysis This bibliography is updated periodically. It's a pretty big, complex topic, and the open literature could use lots more publications. -- Seth David Schoen <sch...@loyalty.org> | Qué empresa fácil no pensar en http://www.loyalty.org/~schoen/ | un tigre, reflexioné. http://vitanuova.loyalty.org/ | -- Borges, El Zahir