[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[freehaven-cvs] cite e2e-traffic too, re: partitioning.



Update of /home/freehaven/cvsroot/doc/wupss04
In directory moria:/home/arma/work/freehaven/doc/wupss04

Modified Files:
	usability.bib usability.pdf usability.tex 
Log Message:
cite e2e-traffic too, re: partitioning.


Index: usability.bib
===================================================================
RCS file: /home/freehaven/cvsroot/doc/wupss04/usability.bib,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -d -r1.6 -r1.7
--- usability.bib	21 Mar 2006 02:56:58 -0000	1.6
+++ usability.bib	21 Mar 2006 03:37:25 -0000	1.7
@@ -1,3 +1,15 @@
+@inproceedings{e2e-traffic,
+  title = {Practical Traffic Analysis: Extending and Resisting Statistical Discl
+osure},
+  author = {Nick Mathewson and Roger Dingledine},
+  booktitle = {Proceedings of Privacy Enhancing Technologies workshop (PET 2004)
+},
+  volume = {3424},
+  year = {2004},
+  month = {May},
+  series = {LNCS},
+}
+
 @Proceedings{Soups05,
   title = {Proceedings of the Symposium on Usability Privacy and Security (SOUPS 2005)},
   editor = {Lorrie Cranor and Mary Ellen Zurko},

Index: usability.pdf
===================================================================
RCS file: /home/freehaven/cvsroot/doc/wupss04/usability.pdf,v
retrieving revision 1.6
retrieving revision 1.7
diff -u -d -r1.6 -r1.7
Binary files /tmp/cvs4w28GB and /tmp/cvsz1eYVz differ

Index: usability.tex
===================================================================
RCS file: /home/freehaven/cvsroot/doc/wupss04/usability.tex,v
retrieving revision 1.27
retrieving revision 1.28
diff -u -d -r1.27 -r1.28
--- usability.tex	21 Mar 2006 03:13:04 -0000	1.27
+++ usability.tex	21 Mar 2006 03:37:26 -0000	1.28
@@ -43,7 +43,7 @@
 
 While security software is the product of developers, the security it
 provides is a collaboration between developers and users.  It's not enough
-to make software that \emph{can} be used securely; software that
+to make software that \emph{can} be used securely---software that
 is hard to use often suffers in its security as a result.
 
 For example, suppose there are two popular mail encryption programs:
@@ -118,7 +118,8 @@
 %\section{Security by distributed trust}
 \section{Usability is even more important for privacy}
 
-Usability affects security in systems that aim to protect data
+We described above that usability affects security in systems that aim
+to protect data
 confidentiality.  But when the goal is {\it privacy}, it can become even
 more important.  A large category of {\it anonymizing networks}, such as
 Tor, JAP, Mixminion, and Mixmaster, aim to hide not only what is being
@@ -205,7 +206,8 @@
 information to break exiting messages into ``messages from User1,''
 ``messages from User2,'' and so on, and can now get away with linking
 messages to their senders as groups, rather than trying to guess from
-individual messages.  Some of this {\it partitioning} is inevitable:
+individual messages~\cite{minion-design,e2e-traffic}.
+Some of this {\it partitioning} is inevitable:
 if Alice speaks Arabic and Bob speaks Bulgarian, we can't force them
 both to learn English in order to mask each other.
 

***********************************************************************
To unsubscribe, send an e-mail to majordomo@xxxxxxxx with
unsubscribe freehaven-cvs       in the body. http://freehaven.net/