[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[freehaven-cvs] Fixed some typos, corrected bib errors.



Update of /home2/freehaven/cvsroot/doc/mixmaster-vs-reliable
In directory moria.mit.edu:/tmp/cvs-serv14723

Modified Files:
	mixvreliable.tex 
Log Message:
Fixed some typos, corrected bib errors.


Index: mixvreliable.tex
===================================================================
RCS file: /home2/freehaven/cvsroot/doc/mixmaster-vs-reliable/mixvreliable.tex,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -d -r1.7 -r1.8
--- mixvreliable.tex	25 Mar 2004 22:53:58 -0000	1.7
+++ mixvreliable.tex	26 Mar 2004 06:07:51 -0000	1.8
@@ -73,7 +73,7 @@
 input and an output messages by looking at the time the message arrived to
 and left from the mix.
 
-The idea of mixes was introduced by Chaum \cite{chaum81untraceable}.  
+The idea of mixes was introduced by Chaum \cite{chaum-mix}.  
 This first design was a \emph{threshold mix}, a mix that collects a
 certain number of messages and then flushes them. Since then, variants on
 this first design have been proposed in the literature. In this paper, we
@@ -82,7 +82,7 @@
 providing anonymous email services since 1995.
 
 The first design is called ``Mixmaster'' (as the remailer network) because
-it corresponds to the original design by Cottrell \cite{Cott94,Mix_prot}.
+it corresponds to the original design by Cottrell \cite{remailer-attacks,mixmaster-spec}.
 The second design, called ``Reliable'', uses a different reordering
 strategy.~\cite {RProcess} The details of the two remailers are explained
 in the following sections. We compare version 3.0 of the Mixmaster
@@ -97,7 +97,7 @@
   for the two protocols generally do not overlap, this does not impact
   our results. The Cypherpunk remailer protocol is known to contain
   numerous flaws, and should not be used if strong anonymity is
-  required\cite{cottrell,mixminion}.}  
+  required\cite{remailer-attacks,mixminion}.}  
 is a \emph{pool} mix. Pool mixes process the messages in batches. They
 collect messages for some time, place them in the pool (memory of the
 mix), and select some of them for flushing (in random order) when the
@@ -766,7 +766,7 @@
 non-host based active attacks such as $(n-1)$ attacks. The anonymity
 strength of a remailer should not require pool values to be hidden, and
 countermeasures to this class of active attacks should be
-taken.~\footnote{rgb-mix}
+taken.~\cite{rgb-mix}
 
 
 \section{Conclusions and future work}

***********************************************************************
To unsubscribe, send an e-mail to majordomo@seul.org with
unsubscribe freehaven-cvs       in the body. http://freehaven.net/