On the left, users first access mailboxes. Then, the server disconnects users from the mailboxes and adds cover traffic. An adversary cannot tell who is talking to whom by looking at mailbox access patterns. Anonymity networks, which sit on top ...
On the left, users first access mailboxes. Then, the server disconnects users from the mailboxes and adds cover traffic. An adversary cannot tell who is talking to whom by looking at mailbox access patterns. Anonymity networks, which sit on top ...