Brenda Timmerman

Learn More
As public internetworks are increasingly used for secure communications, the need grows for end-to-end protection fi'om traffic analysis. The additional protection of Traffic Flow Confidentiality can be detrimental to performance when padding is used to mask traffic patterns. Traffic masking policies that are responsive to system service requirements can(More)
Researchers evaluate and contrast new network routing, admission control, congestion control and flow control algorithms through simulation. Analytically de-rived arguments justifiably lack credibility because, in the attempt to model the underlying physical system, the analyst is forced to make compromising approximations. However, unlike analytical(More)
  • 1