[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[freehaven-cvs] Rearrange graphs; tweak captions.



Update of /home/freehaven/cvsroot/doc/e2e-traffic
In directory moria.mit.edu:/tmp/cvs-serv24974

Modified Files:
	e2e-traffic.tex 
Log Message:
Rearrange graphs; tweak captions.

Index: e2e-traffic.tex
===================================================================
RCS file: /home/freehaven/cvsroot/doc/e2e-traffic/e2e-traffic.tex,v
retrieving revision 1.45
retrieving revision 1.46
diff -u -d -r1.45 -r1.46
--- e2e-traffic.tex	2 May 2004 21:58:57 -0000	1.45
+++ e2e-traffic.tex	2 May 2004 22:12:33 -0000	1.46
@@ -914,7 +914,7 @@
 \begin{figure}
 \begin{minipage}[t]{5.75cm}
 \mbox{\epsfig{angle=0,figure=graphs/fig5a,width=6cm}}
-\caption{Independent geometric dummy messages: median rounds to guess all
+\caption{Independent geometric padding: median rounds to guess all
   recipients}
 \label{fig5a}
 \end{minipage}
@@ -965,6 +965,21 @@
 such an attacker is {\it not} delayed by increased variability in message
 delays.
 
+\begin{figure}
+\begin{minipage}[t]{5.75cm}
+\mbox{\epsfig{angle=0,figure=graphs/fig5d,width=6cm}}
+\caption{Full padding, background known: median rounds to guess all recipients}
+\label{fig5d}
+\end{minipage}
+\hfill
+\begin{minipage}[t]{5.75cm}
+\mbox{\epsfig{angle=0,figure=graphs/fig6,width=6cm}}
+\caption{Partial observation: median rounds to guess all recipients}
+\label{fig6}
+\end{minipage}
+\hfill
+\end{figure}
+
 \subsubsection{The impact of partial observation:}
 %\label{subsec:sim-partial}
 %trial 6
@@ -983,22 +998,6 @@
 the attacker with probability $\Pobserve=f$.  The attacker sees a message
 when it enters {\it and} when it exits with probability $({\Pobserve})^2$.
 
-
-\begin{figure}
-\begin{minipage}[t]{5.75cm}
-\mbox{\epsfig{angle=0,figure=graphs/fig5d,width=6cm}}
-\caption{Perfect padding, prior background known: median rounds to guess all recipients}
-\label{fig5d}
-\end{minipage}
-\hfill
-\begin{minipage}[t]{5.75cm}
-\mbox{\epsfig{angle=0,figure=graphs/fig6,width=6cm}}
-\caption{Partial observation: median rounds to guess all recipients}
-\label{fig6}
-\end{minipage}
-\hfill
-\end{figure}
-
 The results in Figure~\ref{fig6} show that the attacker can still implement a
 long-term intersection attack even when he is only observing part of the
 network.  When most of the network is observed ($\Pobserve>70\%$ in our
@@ -1023,7 +1022,7 @@
 Our model differs most from reality in four ways: First, real user behavior
 is more complex than we have assumed. Second, user behavior changes over
 time.  Third, real messages often exhibit full or partial linkability (as
-described in section~\ref{subsec:strengthening}), which we have not
+described in section~\ref{subsec:strenghtening}), which we have not
 simulated.  Fourth, real attackers are not limited to passive observation.
 We each of these points before.
 % These need to get re-ordered. -NM
@@ -1036,7 +1035,7 @@
 traffic patterns in actual mix-nets \cite{mixvreliable} suggests that this
 variation is probably significant.
 
-In section~\ref{subsec:strengthening}, we briefly discuss how an attacker can
+In section~\ref{subsec:strenghtening}, we briefly discuss how an attacker can
 try to handle a scenario where the background traffic changes slowly over
 time, and perhaps a similar approach would also help against a sender whose
 recipients were not constant.  In the absence of a model for time-variant

***********************************************************************
To unsubscribe, send an e-mail to majordomo@seul.org with
unsubscribe freehaven-cvs       in the body. http://freehaven.net/