[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[freehaven-cvs] tweaks, fixes, typos
Update of /home2/freehaven/cvsroot/doc/e2e-traffic
In directory moria.mit.edu:/tmp/cvs-serv26351
Modified Files:
e2e-traffic.tex
Log Message:
tweaks, fixes, typos
Index: e2e-traffic.tex
===================================================================
RCS file: /home2/freehaven/cvsroot/doc/e2e-traffic/e2e-traffic.tex,v
retrieving revision 1.20
retrieving revision 1.21
diff -u -d -r1.20 -r1.21
--- e2e-traffic.tex 24 Jan 2004 02:39:34 -0000 1.20
+++ e2e-traffic.tex 24 Jan 2004 03:45:07 -0000 1.21
@@ -29,7 +29,7 @@
\begin{document}
\title{Practical Traffic Analysis: \\
- Extending and resisting statistical disclosure}
+ Extending and Resisting Statistical Disclosure}
\author{Nick Mathewson and Roger Dingledine}
\institute{The Free Haven Project\\
@@ -749,14 +749,14 @@
\label{fig1}
\end{figure}
-We present the results of our simulations in figure \ref{fig1}. (We found
+We present the results of our simulations in Figure \ref{fig1}. (We found
that the time required for the attacker to learn Alice's last few recipients
was highly variable, especially in later simulations, so we present instead
the $90^{th}$ percentile of number of rounds required to $m-1$ of Alice's
recipients, across 100 trials per data point.) As expected, the attack
-becomes more effective when Alice's sends messages to a brader group of
+becomes more effective when Alice sends messages to a broader group of
recipients (large $m$); when there are fewer recipients for Alice to hide
-hers among (small $N$); or when batch sizes are large (large $b$).
+hers among (small $N$); or when batch sizes are small (small $b$).
\subsubsection{Complex sender behavior and unknown background traffic}
% trial2
@@ -824,14 +824,14 @@
\label{fig2b}
\end{figure}
-The results are in figures \ref{fig2a} and \ref{fig2b}. Lines that run off
+The results are in Figures \ref{fig2a} and \ref{fig2b}. Lines that run off
the top of the graph represent cases in which the attacks did not converge on
$m-1$ of Alice's recipients within 1,000,000 rounds. As expected, the attack
succeeded fastest against the UU cases for equivalent values of
$\left<N,m,b>\right>$, followed by BU and BB. Also, Alice's message volume
parameter $P_M$ had little effect on the attack for the range examined, other
than to force the attacker to wait for a greater number of rounds to elapse
-before Alice has sent enought traffic.
+before Alice has sent enough traffic.
\subsubsection{Attacking pool mixes and mix-nets}
\label{subsec:sim-complex-mixes}
@@ -861,13 +861,13 @@
\centering
\mbox{\epsfig{angle=0,figure=graphs/fig34,width=4in}}
\caption{Pool mixes and mix-nets: Rounds to guess $m-1$ recipients
- ($90^{th$} percentile of trial attacks)}
+ ($90^{th}$ percentile of trial attacks)}
\label{fig34}
\end{figure}
-To examine the effect of pool paramters, we fixed $m$ at $32$ and $N$ at
-$2^16$. The results of these simulations are presented in figure
-\ref{fig34}. From this, we note two interesting effects: first,
+To examine the effect of pool parameters, we fixed $m$ at $32$ and $N$ at
+$2^16$. The results of these simulations are presented in
+Figure~\ref{fig34}. From this, we note two interesting effects: first,
pooling has the most effect when Alice has a very high traffic volume, and is
only incrementally helpful when Alice has
***********************************************************************
To unsubscribe, send an e-mail to majordomo@seul.org with
unsubscribe freehaven-cvs in the body. http://freehaven.net/