[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[minion-cvs] moved to latex8 style file



Update of /home/minion/cvsroot/doc
In directory moria.mit.edu:/home/arma/work/minion/doc

Modified Files:
	SWAP.pdf minion-design.bib minion-design.tex 
Added Files:
	latex8.bst latex8.sty 
Log Message:
moved to latex8 style file

14 pages now rather than 12
no more keywords
email addresses on first page now in normal font
changed things so the conclusion doesn't break over two pages
more tweaks to bib so the newlines match up ok

whee



--- NEW FILE: latex8.bst ---

% ---------------------------------------------------------------
%
% $Id: latex8.bst,v 1.1 2003/03/07 23:39:20 arma Exp $
%
% by Paolo.Ienne@di.epfl.ch
%

% ---------------------------------------------------------------
%
% no guarantee is given that the format corresponds perfectly to 
% IEEE 8.5" x 11" Proceedings, but most features should be ok.
%
% ---------------------------------------------------------------
%
% `latex8' from BibTeX standard bibliography style `abbrv'
% version 0.99a for BibTeX versions 0.99a or later, LaTeX version 2.09.
% Copyright (C) 1985, all rights reserved.
% Copying of this file is authorized only if either
[...1085 lines suppressed...]
}

EXECUTE {begin.bib}

EXECUTE {init.state.consts}

ITERATE {call.type$}

FUNCTION {end.bib}
{ newline$
  "\end{thebibliography}" write$ newline$
}

EXECUTE {end.bib}

% end of file latex8.bst
% ---------------------------------------------------------------




--- NEW FILE: latex8.sty ---

% --------------------------------------------------------------- 
%
% $Id: latex8.sty,v 1.1 2003/03/07 23:39:20 arma Exp $
% 
% by Paolo.Ienne@di.epfl.ch 
%
% --------------------------------------------------------------- 
%
% no guarantee is given that the format corresponds perfectly to 
% IEEE 8.5" x 11" Proceedings, but most features should be ok.
%
% --------------------------------------------------------------- 
% with LaTeX2e:
% =============
%
% use as 
%   \documentclass[times,10pt,twocolumn]{article} 
%   \usepackage{latex8}
%   \usepackage{times}
%
% --------------------------------------------------------------- 

% with LaTeX 2.09:
% ================
%
% use as 
%   \documentstyle[times,art10,twocolumn,latex8]{article}
%
% --------------------------------------------------------------- 
% with both versions:
% ===================
%
% specify \pagestyle{empty} to omit page numbers in the final 
% version
%
% specify references as
%   \bibliographystyle{latex8}
%   \bibliography{...your files...}
%
% use Section{} and SubSection{} instead of standard section{} 
%    and subsection{} to obtain headings in the form 
%    "1.3. My heading"
%
% ---------------------------------------------------------------

\typeout{IEEE 8.5 x 11-Inch Proceedings Style `latex8.sty'.}

% ten point helvetica bold required for captions
% in some sites the name of the helvetica bold font may differ, 
% change the name here:
\font\tenhv  = phvb at 10pt
%\font\tenhv  = phvb7t at 10pt

% eleven point times bold required for second-order headings 
% \font\elvbf  = cmbx10 scaled 1100
\font\elvbf  = ptmb scaled 1100

% set dimensions of columns, gap between columns, and paragraph indent 
\setlength{\textheight}{8.875in}
\setlength{\textwidth}{6.875in}
\setlength{\columnsep}{0.3125in}
\setlength{\topmargin}{0in}
\setlength{\headheight}{0in}
\setlength{\headsep}{0in}
\setlength{\parindent}{1pc}
\setlength{\oddsidemargin}{-.304in}
\setlength{\evensidemargin}{-.304in}

% memento from size10.clo
% \normalsize{\@setfontsize\normalsize\@xpt\@xiipt} 
% \small{\@setfontsize\small\@ixpt{11}}
% \footnotesize{\@setfontsize\footnotesize\@viiipt{9.5}} 
% \scriptsize{\@setfontsize\scriptsize\@viipt\@viiipt}
% \tiny{\@setfontsize\tiny\@vpt\@vipt}
% \large{\@setfontsize\large\@xiipt{14}} 
% \Large{\@setfontsize\Large\@xivpt{18}} 
% \LARGE{\@setfontsize\LARGE\@xviipt{22}} 
% \huge{\@setfontsize\huge\@xxpt{25}}
% \Huge{\@setfontsize\Huge\@xxvpt{30}}

\def\@maketitle
   {
   \newpage
   \null
   \vskip .375in 
   \begin{center}
      {\Large \bf \@title \par} 
      % additional two empty lines at the end of the title 
      \vspace*{24pt} 
      {
      \large 
      \lineskip .5em
      \begin{tabular}[t]{c}
         \@author 
      \end{tabular}
      \par
      } 
      % additional small space at the end of the author name 
      \vskip .5em 
      {
       \large 
      \begin{tabular}[t]{c}
         \@affiliation 
      \end{tabular}
      \par 
      \ifx \@empty \@email
      \else
         \begin{tabular}{r@{~}l}
            E-mail: & {\tt \@email}
         \end{tabular}
         \par
      \fi
      }
      % additional empty line at the end of the title block 
      \vspace*{12pt} 
   \end{center}
   } 

\def\abstract
   {%
   \centerline{\large\bf Abstract}%
   \vspace*{12pt}%
   \it%
   }

\def\endabstract
   {
   % additional empty line at the end of the abstract 
   \vspace*{12pt} 
   }

\def\affiliation#1{\gdef\@affiliation{#1}} \gdef\@affiliation{}

\def\email#1{\gdef\@email{#1}}
\gdef\@email{}

\newlength{\@ctmp}
\newlength{\@figindent}
\setlength{\@figindent}{1pc}

\long\def\@makecaption#1#2{
   \vskip 10pt
   \setbox\@tempboxa\hbox{\tenhv\noindent #1.~#2} 
   \setlength{\@ctmp}{\hsize}
   \addtolength{\@ctmp}{-\@figindent}\addtolength{\@ctmp}{-\@figindent} 
   % IF longer than one indented paragraph line
   \ifdim \wd\@tempboxa >\@ctmp
      % THEN set as an indented paragraph
      \begin{list}{}{\leftmargin\@figindent \rightmargin\leftmargin} 
         \item[]\tenhv #1.~#2\par
      \end{list}
   \else
      % ELSE center
      \hbox to\hsize{\hfil\box\@tempboxa\hfil} 
   \fi}

% correct heading spacing and type
\def\section{\@startsection {section}{1}{\z@}
   {14pt plus 2pt minus 2pt}{14pt plus 2pt minus 2pt} {\large\bf}} 
\def\subsection{\@startsection {subsection}{2}{\z@}
   {13pt plus 2pt minus 2pt}{13pt plus 2pt minus 2pt} {\elvbf}}

% add the period after section numbers 
\newcommand{\Section}[1]{\section{\hskip -1em.~#1}} 
\newcommand{\SubSection}[1]{\subsection{\hskip -1em.~#1}}

% end of file latex8.sty
% ---------------------------------------------------------------

Index: SWAP.pdf
===================================================================
RCS file: /home/minion/cvsroot/doc/SWAP.pdf,v
retrieving revision 1.1
retrieving revision 1.2
diff -u -d -r1.1 -r1.2
Binary files /tmp/cvsg7JDlJ and /tmp/cvsiMfnQk differ

Index: minion-design.bib
===================================================================
RCS file: /home/minion/cvsroot/doc/minion-design.bib,v
retrieving revision 1.22
retrieving revision 1.23
diff -u -d -r1.22 -r1.23
--- minion-design.bib	5 Mar 2003 07:30:31 -0000	1.22
+++ minion-design.bib	7 Mar 2003 23:39:20 -0000	1.23
@@ -6,7 +6,8 @@
     month = Aug,
     publisher = {USENIX},
     pages = "85--96",
-    note = {\url{http://www.usenix.org/publications/library/proceedings/sec2000/full_papers/rao/rao.pdf}},
+    note = {\url{http://www.usenix.org/publications/library/proceedings/sec2000/
+full_papers/rao/rao.pdf}},
 }
 
 @InProceedings{pfitzmann90how,
@@ -15,13 +16,13 @@
     booktitle = {Eurocrypt 89},
     publisher = {Springer-Verlag, LNCS 434},
     year = {1990},
-    note = {\newline \url{http://citeseer.nj.nec.com/pfitzmann90how.html}},
+    note = {\url{http://citeseer.nj.nec.com/pfitzmann90how.html}},
 }
 
 @Misc{mixminion-spec,
    author =      {Mixminion},
    title =       {Type {III} ({M}ixminion) Mix Protocol Specifications},
-   note =        {\url{http://mixminion.net/minion-spec.txt}},
+   note =        {\newline \url{http://mixminion.net/minion-spec.txt}},
 }
 
 @InProceedings{BM:mixencrypt,
@@ -126,7 +127,7 @@
    howpublished = {IETF RFC 2246},
    month =       {January},
    year =        {1999},
-   note =        {\newline \url{http://www.rfc-editor.org/rfc/rfc2246.txt}},
+   note =        {\url{http://www.rfc-editor.org/rfc/rfc2246.txt}},
 }
 
 @Misc{SMTP,
@@ -135,7 +136,7 @@
    howpublished = {IETF RFC 2821 (also STD0010)},
    month =       {April},
    year =        {2001},
-   note =        {\newline \url{http://www.rfc-editor.org/rfc/rfc2821.txt}},
+   note =        {\url{http://www.rfc-editor.org/rfc/rfc2821.txt}},
 }
 
 @Misc{IMAP,
@@ -153,7 +154,7 @@
    howpublished = {IETF RFC 1939 (also STD0053)},
    month =       {May},
    year =        {1996},
-   note =        {\newline \url{http://www.rfc-editor.org/rfc/rfc1939.txt}},
+   note =        {\url{http://www.rfc-editor.org/rfc/rfc1939.txt}},
 }
 
 @InProceedings{syverson_2000,
@@ -167,7 +168,7 @@
   pages =        {96--114},
   editor =       {H. Federrath},
   publisher =    {Springer-Verlag, LNCS 2009},
-  note =         {\url{http://citeseer.nj.nec.com/syverson00towards.html}}
+  note =         {\newline \url{http://citeseer.nj.nec.com/syverson00towards.html}}
 }
 
 @InProceedings{shuffle,
@@ -352,7 +353,7 @@
    booktitle =   {{EUROCRYPT} 2000},
    year =        {2000},
    publisher =   {Springer-Verlag, LNCS 1803},
-   note =        {\newline \url{http://citeseer.nj.nec.com/447709.html}},
+   note =        {\url{http://citeseer.nj.nec.com/447709.html}},
 }
 
 @InProceedings{mitkuro,
@@ -388,7 +389,7 @@
   booktitle =   {Principles of Distributed Computing - {PODC} '01},
   year = "2001",
   publisher =   {ACM Press},
-  note = {\newline \url{http://citeseer.nj.nec.com/492015.html}},
+  note = {\url{http://citeseer.nj.nec.com/492015.html}},
 }
 
 @InProceedings{kesdogan,
@@ -398,7 +399,7 @@
    booktitle =   {Information Hiding (IH 1998)},
    year =        {1998},
    publisher =   {Springer-Verlag, LNCS 1525},
-   note =        {\newline \url{http://www.cl.cam.ac.uk/~fapp2/ihw98/ihw98-sgmix.pdf}},
+   note =        {\url{http://www.cl.cam.ac.uk/~fapp2/ihw98/ihw98-sgmix.pdf}},
 }
 
 @InProceedings{flash-mix,
@@ -481,7 +482,7 @@
    volume =      {4},
    number =      {2},
    month =       {February},
-   note =        {\newline \url{http://www.eskimo.com/~weidai/mix-net.txt}},
+   note =        {\url{http://www.eskimo.com/~weidai/mix-net.txt}},
 }
 
 @InProceedings{nym-alias-net,
@@ -612,7 +613,7 @@
    school =      {{MIT}},
    title =       {Private {I}nformation {R}etrieval},
    year =        {2000},
-   note =        {\url{http://toc.lcs.mit.edu/~tal/pubs.html}}
+   note =        {\newline \url{http://toc.lcs.mit.edu/~tal/pubs.html}}
 }
 
 @Misc{zks,
@@ -690,7 +691,7 @@
   year =         2002,
   editor =       {Matt Blaze},
   publisher =    {Springer-Verlag, LNCS (forthcoming)},
-  note =        {\url{http://www.freehaven.net/papers.html}},
+  note =        {\newline \url{http://www.freehaven.net/papers.html}},
 }
 
 @InProceedings{zhou96certified,

Index: minion-design.tex
===================================================================
RCS file: /home/minion/cvsroot/doc/minion-design.tex,v
retrieving revision 1.108
retrieving revision 1.109
diff -u -d -r1.108 -r1.109
--- minion-design.tex	7 Mar 2003 04:36:46 -0000	1.108
+++ minion-design.tex	7 Mar 2003 23:39:20 -0000	1.109
@@ -1,10 +1,13 @@
 
-\documentclass[final]{ieee}
-
+\documentclass[times,10pt,twocolumn]{article}
+\usepackage{latex8}
+\usepackage{times}
 \usepackage{url}
 \usepackage{graphics}
 \usepackage{amsmath}
 
+\pagestyle{empty}
+
 \renewcommand\url{\begingroup \def\UrlLeft{<}\def\UrlRight{>}\urlstyle{tt}\Url}
 \newcommand\emailaddr{\begingroup \def\UrlLeft{<}\def\UrlRight{>}\urlstyle{tt}\Url}
 
@@ -32,17 +35,16 @@
 \title{Mixminion: Design of a Type III Anonymous Remailer Protocol}
 
 %\author{George Danezis\inst{1} \and Roger Dingledine\inst{2} \and Nick Mathewson\inst{2}}
-\author{George Danezis \\ University of Cambridge \\ \emailaddr{george.danezis@cl.cam.ac.uk} \and
-Roger Dingledine and Nick Mathewson \\ The Free Haven Project \\ \emailaddr{{arma,nickm}@freehaven.net}}
+\author{George Danezis \\ University of Cambridge \\ george.danezis@cl.cam.ac.uk \and
+Roger Dingledine and Nick Mathewson \\ The Free Haven Project \\ \{arma,nickm\}@freehaven.net}
 %\institute{Cambridge University
 %\email{\emailaddr{george.danezis@cl.cam.ac.uk}}
 %\and
 %The Free Haven Project
 %\email{\emailaddr{{arma,nickm}@freehaven.net}}}
 
-\pagestyle{titlepagestyle}
 \maketitle
-\pagestyle{empty}
+\thispagestyle{empty}
 
 \begin{abstract}
 We present Mixminion, a message-based anonymous remailer protocol with
@@ -60,26 +62,26 @@
 as or better than other systems with similar design parameters.
 \end{abstract}
 
-\begin{center}
-\textbf{Keywords:} anonymity, mix-net, peer-to-peer, remailer, nymserver, reply block
-\end{center}
+%\begin{center}
+%\textbf{Keywords:} anonymity, mix-net, peer-to-peer, remailer, nymserver, reply block
+%\end{center}
 
 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
 
-\section{Overview}
+\Section{Overview}
 \label{sec:intro}
 
 Chaum first introduced anonymous remailers over 20 years ago
 \cite{chaum-mix}.
 The research community has since introduced many new
 designs and proofs
-\cite{abe}\cite{babel}\cite{flash-mix}\cite{kesdogan}\cite{shuffle}\cite{hybrid-mix}, 
+\cite{abe,babel,flash-mix,kesdogan,shuffle,hybrid-mix}, 
 and discovered a variety of new attacks 
-\cite{back01}\cite{langos02}\cite{disad-free-routes}\cite{desmedt}\cite{mitkuro}\cite{raymond00}.
+\cite{back01,langos02,disad-free-routes,desmedt,mitkuro,raymond00}.
 But because many of the newer designs require considerable coordination,
 synchronization, bandwidth, or processing resources, deployed remailers still use
 Cottrell's Mixmaster design from 1994
-\cite{mixmaster-attacks}\cite{mixmaster-spec}. Here we describe Mixminion, a
+\cite{mixmaster-attacks,mixmaster-spec}. Here we describe Mixminion, a
 protocol for asynchronous, loosely federated remailers that maintains
 Mixmaster's flexibility while addressing the following flaws:
 
@@ -196,7 +198,7 @@
 
 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
 
-\section{Background}
+\Section{Background}
 \label{sec:background}
 
 Chaum introduced the concept of using relay servers, or \emph{mixes},
@@ -237,7 +239,7 @@
 who owns many mixes \cite{disad-free-routes}, but they are also more
 vulnerable to blending attacks such as trickle or flooding attacks
 \cite{trickle02}.
-Furthermore, cascade networks arguably have lower maximum anonymity because
+Further, cascade networks arguably have lower maximum anonymity because
 the number of people Alice can hide among (her \emph{anonymity set}) is limited
 to the number of messages the weakest node in her cascade can handle.
 In a free-route network, larger anonymity sets are possible because no
@@ -249,8 +251,8 @@
 More complex designs use zero-knowledge proofs and stronger assumptions
 to guarantee delivery or to detect and exclude misbehaving participants.
 These include flash mixes \cite{flash-mix},
-hybrid mixes \cite{jakobsson-optimally}\cite{hybrid-mix},
-and provable shuffles \cite{PShuffle}\cite{shuffle}. The properties
+hybrid mixes \cite{jakobsson-optimally,hybrid-mix},
+and provable shuffles \cite{PShuffle,shuffle}. The properties
 of these designs are appealing, but they are often impractical since
 they assume fairly strong coordination and synchronization between the mixes
 and impose a heavy computational and communication overhead.
@@ -277,11 +279,11 @@
 wrote the first Cypherpunk anonymous remailer \cite{remailer-history};
 Finney followed closely with a collection of scripts that used Phil
 Zimmermann's PGP to encrypt and decrypt remailed messages. Later, Cottrell
-implemented the Mixmaster system \cite{mixmaster-attacks}\cite{mixmaster-spec},
+implemented the Mixmaster system \cite{mixmaster-attacks,mixmaster-spec},
 or ``Type II'' remailers, which added message padding, message pools,
 and other mix features lacking in the Cypherpunk remailers.
 
-\subsection{Known attacks against mix-nets}
+\SubSection{Known attacks against mix-nets}
 
 Attacks against mix-nets aim to reduce the anonymity of users by
 linking anonymous senders with the messages they send, by linking
@@ -383,7 +385,7 @@
 
 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
 
-\section{Design goals and assumptions}
+\Section{Design goals and assumptions}
 \label{sec:assumptions}
 
 Mixminion brings together the current best practical approaches
@@ -399,7 +401,7 @@
 
 %While Mixminion protects against known \emph{traffic analysis} attacks
 %(where an adversary attempts to learn a given message's sender or receiver
-%\cite{rackoff93cryptographic}\cite{raymond00}), we do not fully address
+%\cite{rackoff93cryptographic,raymond00}), we do not fully address
 %\emph{traffic confirmation} attacks such as intersection attacks.
 %In a traffic confirmation attack, the adversary treats the mix network
 %as a black box and observes the behavior of senders and receivers. Over
@@ -475,7 +477,7 @@
 
 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
 
-\section{The Mixminion Mix-net Design}
+\Section{The Mixminion Mix-net Design}
 
 \label{sec:design}
 
@@ -519,7 +521,7 @@
 its integration with the normal sender anonymous message delivery, and
 how we defeat tagging-related attacks.  
 
-\subsection{Recipient anonymity and indistinguishable replies}
+\SubSection{Recipient anonymity and indistinguishable replies}
 \label{subsec:replies}
 \label{subsec:header-swap}
 
@@ -556,7 +558,7 @@
 Each subheader contains a hash of the remainder of its header as seen
 by that mix, so we can do integrity-checking of the path (but not the
 payload) within each leg. Each subheader also contains a master secret,
-which is used to derive a symmetric key for decrypting the rest of the
+used to derive a symmetric key for decrypting the rest of the
 message. To make sure that the hash matches even though each hop
 must repad the header to maintain constant message length, we need to
 add predictable padding to the end of the header: the mix appends an
@@ -790,7 +792,7 @@
 are less frequent on forward paths, and therefore a message which is
 crossing-over is more likely to be a reply message.
 
-\subsection{Multiple-message tagging attacks}
+\SubSection{Multiple-message tagging attacks}
 \label{subsec:multi-tagging}
 
 The above design is still vulnerable to a subtle and dangerous
@@ -836,14 +838,14 @@
 analysis of the multiple-paths idea to future work, but see
 Section \ref{sec:maintaining-anonymity}.
 
-\section{Other design decisions}
+\Section{Other design decisions}
 
 %In this section we discuss how we are using
 %link encryption with ephemeral keys to provide forward anonymity,
 %message types and modules to handle different types of messages, and
 %exit policies for advertising what delivery options a node will provide.
 
-\subsection{Forward secure link encryption and its benefits}
+\SubSection{Forward secure link encryption and its benefits}
 \label{subsec:link-encrypt}
 
 Unlike remailer Types I and II that used SMTP \cite{SMTP} (ordinary
@@ -934,7 +936,7 @@
 support, as the next section discusses.  
 % Credit for the above point goes to Len.
 
-\subsection{Message types and delivery modules}
+\SubSection{Message types and delivery modules}
 \label{subsec:delivery-modules}
 
 %XXXX
@@ -964,7 +966,7 @@
 a mailbox.\footnote{A {\it mailbox} is the canonical form of the
 ``{\tt user@domain}'' part of an e-mail address. Mixminion uses only
 mailboxes in the protocol, because the other parts
-of an e-mail address could potentially differ among senders who
+of an e-mail address could differ among senders who
 obtain an address from different sources, thus leading to smaller
 anonymity sets.}
 This information is placed
@@ -1024,7 +1026,7 @@
 extensibility \emph{per se}, but rather argue against the proliferation
 of redundant extensions, and against the use of rare extensions.  
 
-\subsection{Exit policies and abuse}
+\SubSection{Exit policies and abuse}
 \label{subsec:exitpolicies}
 
 One important entry in a node's capability block is its \emph{exit
@@ -1087,7 +1089,7 @@
 number of available open exit nodes remains a limiting security parameter
 for the remailer network.
 
-\subsection{Replay prevention, message expiration, and key rotation}
+\SubSection{Replay prevention, message expiration, and key rotation}
 \label{subsec:replay}
 
 Mixmaster offers rudimentary replay prevention by keeping a list of recent
@@ -1163,7 +1165,7 @@
 
 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
 
-\section{Directory Servers}
+\Section{Directory Servers}
 \label{sec:dir-servers}
 
 The Mixmaster protocol does not specify a means for clients to learn the
@@ -1174,7 +1176,6 @@
 information, clients cannot respond to changes in the set of mixes, or to
 changes in mix keys.)
 Here
-% XXXX would be nice to cite some more. eg, are there key lists, etc? -RRD
 we describe Mixminion directory servers and examine the anonymity risks
 of such information services.
 
@@ -1256,7 +1257,7 @@
 
 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
 
-\section{Nym management and single-use reply blocks}
+\Section{Nym management and single-use reply blocks}
 \label{sec:nymservers}
 
 Current nymservers, such as {\tt nym.alias.net} \cite{nym-alias-net},
@@ -1343,10 +1344,10 @@
 
 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
 
-\section{Maintaining anonymity sets}
+\Section{Maintaining anonymity sets}
 \label{sec:maintaining-anonymity}
 
-\subsection{Batching Strategy}
+\SubSection{Batching Strategy}
 \label{subsec:batching}
 
 Low-latency systems like Onion Routing aim to provide anonymity against an
@@ -1403,7 +1404,7 @@
 at each mix, the set of possible senders when Bob receives the target
 message is large.
 
-\subsection{Dummy policy}
+\SubSection{Dummy policy}
 
 Dummy traffic (sending extra messages that are not actually meant to
 be read or used, to confuse the adversary) is an old approach to
@@ -1441,7 +1442,7 @@
 actually few messages going through the mix, or when most messages are
 created by the adversary.
 
-\subsection{Choosing paths when transmitting many messages}
+\SubSection{Choosing paths when transmitting many messages}
 \label{subsec:many-messages}
 
 When Alice (the owner of a pseudonym) downloads her mail from a
@@ -1490,7 +1491,7 @@
 
 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
 
-\section{Attacks and Defenses}
+\Section{Attacks and Defenses}
 \label{sec:attacks}
 
 Below we summarize a variety of attacks and how well our design withstands
@@ -1583,13 +1584,13 @@
 to encourage users to start using the dishonest ones.}
 Availability and reliability statistics should mitigate some of these
 problems, but they introduce problems of their own. They are an area of
-active research \cite{mix-acc}\cite{casc-rep}.
+active research \cite{mix-acc,casc-rep}.
 \end{itemize}
 \end{enumerate}
 
 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
 
-\section{Future Directions and Open Problems}
+\Section{Future Directions and Open Problems}
 \label{sec:conclusion}
 
 This design document represents the first step in peer review of the
@@ -1653,7 +1654,7 @@
 
 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
 
-\section*{Acknowledgments}
+\Section{Acknowledgments}
 
 This paper incorporates ideas from the Mixmaster development team,
 particularly Len Sassaman, Scott Renfro, Peter Palfrader, Ulf M\"oller,
@@ -1668,8 +1669,7 @@
 
 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
 
-\bibliographystyle{plain}
-
+\bibliographystyle{latex8}
 \bibliography{minion-design}
 
 \end{document}