Using Decoys and Packet Fragmentation