[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[freehaven-cvs] interim spell check



Update of /home/freehaven/cvsroot/doc/routing-zones
In directory moria.mit.edu:/tmp/cvs-serv7618

Modified Files:
	routing-zones.tex 
Log Message:
interim spell check
make citations have non-linebreaking spaces



Index: routing-zones.tex
===================================================================
RCS file: /home/freehaven/cvsroot/doc/routing-zones/routing-zones.tex,v
retrieving revision 1.13
retrieving revision 1.14
diff -u -d -r1.13 -r1.14
--- routing-zones.tex	26 Jan 2004 20:35:22 -0000	1.13
+++ routing-zones.tex	26 Jan 2004 20:38:08 -0000	1.14
@@ -42,7 +42,7 @@
 \label{sec:intro}
 
 A variety of organizations, ranging from corrupt law enforcement
-to curious telcos, % to subpoena-wielding religious fanatics
+to curious ISPs, % to subpoena-wielding religious fanatics
 can passively observe large pieces of the Internet. Anonymity
 networks aim to provide communications privacy for individuals or
 groups on the Internet, but such networks are still vulnerable to powerful
@@ -51,7 +51,7 @@
 network traffic can notice over time that certain recipients are more
 likely to receive messages after given senders have transmitted messages
 \cite{disad-free-routes,statistical-disclosure,e2e-traffic}. Low-latency
-networks like Onion Routing \cite{tor-design} are more directly
+networks like Onion Routing~\cite{tor-design} are more directly
 vulnerable: an eavesdropper on both ends of the connection can quickly
 link sender to recipient through packet counting or timing attacks
 \cite{defensive-dropping,SS03}.
@@ -67,9 +67,9 @@
 traffic, to
 complicate the adversary's attempts to correlate sender and receiver
 \cite{langos02,pipenet,defensive-dropping}.
-%Pipenet \cite{pipenet} conceals traffic patterns by
+%Pipenet~\cite{pipenet} conceals traffic patterns by
 %constant padding on every link, at the cost of robustness. Levine et al
-%show in \cite{defensive-dropping} that a small amount of dummy padding
+%show in~\cite{defensive-dropping} that a small amount of dummy padding
 %mixed into the circuit can significant degrade the effectiveness of
 %timing attacks. 
 %Berthold and Langos aim to increase the
@@ -86,7 +86,7 @@
 network, so an adversary of a given strength sees less of the network
 \cite{econymics,bennett:pet2003,morphmix:fc04}; by arranging the overlay
 topology so messages can enter or exit at more places in the network
-(as opposed to a cascade topology \cite{disad-free-routes});
+(as opposed to a cascade topology~\cite{disad-free-routes});
 or by \emph{jurisdictional arbitrage} --- coordinating network behavior
 so each transaction includes zones (i.e., jurisdictions) controlled by
 several different adversaries.
@@ -126,13 +126,13 @@
 
 This threat model is based on the assumption that the ability to control
 more than one AS is significantly more rare, either because far fewer
-ISPs exist that control multiple ASs,
+ISPs exist that control multiple ASes,
 % Is that true?
 or because law enforcement will be less willing to face the increased
 accountability and risk associated with obtaining multiple unapproved
 subpoenas. 
 
-By requiring the adversary to control multiple ASs, we raise the bar
+By requiring the adversary to control multiple AS's, we raise the bar
 for breaking the anonymity of the system.
 
 \section{Background}
@@ -147,27 +147,27 @@
 
 \subsection{Anonymity networks}
 
-Chaum \cite{chaum81} proposed hiding the correspondence between sender
+Chaum~\cite{chaum81} proposed hiding the correspondence between sender
 and recipient by wrapping messages in layers of public-key cryptography,
 and relaying them through a path composed of \emph{mixes}. Each mix
 in turn decrypts, delays, and re-orders messages, before relaying them
 toward their destinations.
 
 Subsequent anonymity systems have diverged in two directions. Systems
-like Babel \cite{babel}, Mixmaster \cite{mixmaster-spec}, and Mixminion
+like Babel~\cite{babel}, Mixmaster~\cite{mixmaster-spec}, and Mixminion~
 \cite{minion-design} aim to defend against powerful adversaries, but at
-the cost of requiring high and variable
-latency. Other systems, such as Onion Routing or its successor Tor
-\cite{tor-design,or-jsac98}, support low-latency transactions such as
-web browsing, but necessarily have a weaker threat model.
+the cost of requiring high and variable latency. Other systems, such as
+Onion Routing or its successor Tor~\cite{tor-design,or-jsac98}, support
+low-latency transactions such as web browsing, but necessarily have a
+weaker threat model.
 
 Anonymity networks aim to protect against a wide variety of both passive
-and active attacks \cite{back01,raymond00}, but in this paper we do
+and active attacks~\cite{back01,raymond00}, but in this paper we do
 not consider the details of the anonymity network itself. Instead,
 we treat the network as a black box and consider only the endpoints
 (entry node and exit node) for each given transaction. Endpoint
 attacks include simple timing and counting attacks against
-low-latency systems \cite{SS03}, and long-term
+low-latency systems~\cite{SS03}, and long-term
 intersection or disclosure attacks against high-latency systems
 \cite{disad-free-routes,statistical-disclosure,e2e-traffic}.
 
@@ -272,7 +272,7 @@
 or a provider.  These relationships also determine which routes one AS
 will advertise to another.  For example, an AS will typically not
 advertise a route learned from one of its peers or providers to any of
-its other peers or providers: doing so would constitute an implcit
+its other peers or providers: doing so would constitute an implicit
 agreement to forward traffic (i.e., provide ``transit'' service) between
 two of its providers, two of its peers, etc.  The AS in
 Figure~\ref{fig:policy_summary} would advertise routes learned from its
@@ -513,7 +513,7 @@
 
 Since we are also interested in the AS-level paths between the sender
 (Alice) and the mix entry point, and between the mix exit point and the
-reciever (Bob) we must also estimate the ASes where the sender (Alice)
+receiver (Bob) we must also estimate the ASes where the sender (Alice)
 and receiver (Bob) may typically be located.  While usage data for these
 mix networks is not readily available, we can perform reasonable
 approximations by assuming that Alice is located on a home network

***********************************************************************
To unsubscribe, send an e-mail to majordomo@seul.org with
unsubscribe freehaven-cvs       in the body. http://freehaven.net/