This is archived content, mostly untouched since 2003. For newer content/updated versions, see netfuture.ch/Publications.
First page Back Continue Last page Overview Text

Requirements. Many different attackers. Graph reconstruction. Tree rooted at attacker. Vertices and edges. Assumptions. Sources and first. routers untrusted. Routers closer to attacker. trusted. Mark packet with edge.

Notes: