This is archived content, mostly untouched since 2003. For newer content/updated versions, see
netfuture.ch/Publications
.
First page
Back
Continue
Last page
Overview
Graphics
Requirements
Many different attackers
Graph reconstruction
Tree rooted at attacker
Vertices and edges
Assumptions
Sources and first routers untrusted
Routers closer to attacker trusted
Mark packet with edge
Notes: