摘要 |
In a secure communication system, a method for generating dummy traffic to forestall cryptanalytic attack by traffic analysis. Both the dummy traffic signal and certain characteristics of the dummy transmissions, such as duration and inter-transmission delay, are derived from the same source.
|