ABSTRACT

In the previous chapter, we considered what could be learned from the public communications made by adversaries. In this chapter, we consider the same problem, but for communication that is intended to be, or believed to be, private.