[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[freehaven-cvs] More tweaks



Update of /home/freehaven/cvsroot/doc/e2e-traffic
In directory moria.mit.edu:/tmp/cvs-serv31090

Modified Files:
	e2e-traffic.tex 
Log Message:
More tweaks

Index: e2e-traffic.tex
===================================================================
RCS file: /home/freehaven/cvsroot/doc/e2e-traffic/e2e-traffic.tex,v
retrieving revision 1.53
retrieving revision 1.54
diff -u -d -r1.53 -r1.54
--- e2e-traffic.tex	3 May 2004 00:05:01 -0000	1.53
+++ e2e-traffic.tex	3 May 2004 00:10:22 -0000	1.54
@@ -736,7 +736,7 @@
 round, also chosen uniformly at random.  We ran 100 trial attacks for each
 chosen $\left<N,m,b\right>$ tuple.  Each attack was set to halt when the
 attacker has correctly identified Alice's recipients, or when 1,000,000
-rounds had passed.  (We imposed this cap on run time to keep our simulator
+rounds had passed.  (We imposed this cap to keep our simulator
 from getting stuck on hopeless cases.)
 
 %\begin{figure}[ht]
@@ -782,11 +782,11 @@
 
 We model the background as a graph of $N$ communicating parties, each of whom
 communicates with some of the others.  We build this graph according to the
-``scale-free'' model proposed in \cite{scale-emergence} and analyzed in
-\cite{scale-analysis}, which shares desirable properties with ``small-world''
-networks \cite{small-world}.  Scale-free networks share the ``six degrees of
+``scale-free'' model \cite{scale-emergence,scale-analysis}.
+Scale-free networks share the ``six degrees of
 separation property'' (for arbitrary values of six) of small-world
-networks, but also mimic the clustering and `organic' growth of real social
+networks \cite{small-world}, but also mimic the clustering and `organic'
+growth of real social
 networks, including citations in journals, co-stars in IMDB, and links in
 the WWW.
 %
@@ -805,22 +805,22 @@
 with equal frequency and choose recipients uniformly from among the people
 they know.
 
-Again, we simulated trial attacks for different values of $N$ (the number of
-recipients) and $m$ (the number of Alice's recipients).
-Instead of contributing one message per batch, however, Alice now
-contributes messages according to a geometric distribution with parameter
+We simulated trial attacks for different values of $N$ (number of
+recipients) and $m$ (number of Alice's recipients).
+Instead of sending one message per batch, however, Alice now
+sends messages according to a geometric distribution with parameter
 $P_{M}$ (such that Alice sends $n$ messages with probability $P_m(n) =
-(1-P_M)P_M^n$).  We also tried two methods for assigning Alice's
+(1-P_M)P_M^n$).  We tried two methods for assigning Alice's
 recipients: In the `uniform'
 model, Alice's recipients are chosen according to their connectedness (so
-that Alice, like everyone else, is likelier to know people who are already
-well-known), but Alice still sends to each chosen recipient with equal
-probability.  In the `weighted' model, not only are Alice's recipients
+that Alice, like everyone else, is likelier to know well-known people)
+but Alice still sends to her recipients with equal
+probability.  In the `weighted'  model, not only are Alice's recipients
 chosen according to their connectedness, but Alice also sends to them
-proportional to their connectedness.  We selected these
-models to examine the attack's effectiveness against users whose behavior is
-generated with the same model as other users' (U), and against users who mimic
-the background distribution (W).
+proportionally to their connectedness.  We selected these
+models to examine the attack's effectiveness against users who
+behave with the same model as other users', and against users who mimic
+the background distribution.
 
 The results are in Figure~\ref{fig2a}, along with the results for the
 original statistical disclosure attack as reference.  As expected, the attack
@@ -905,7 +905,7 @@
 
 This strategy slows the attack, but does not {\it necessarily} stop it.  As
 shown in Figure~\ref{fig5a}, independent geometric padding is most helpful
-when the underlying mix network has a higher variability in message delay to
+when the mix network has a higher variability in message delay to
 `spread' the padding between rounds.  Otherwise, Alice must send far more
 padding messages to confuse the attacker.
 

***********************************************************************
To unsubscribe, send an e-mail to majordomo@seul.org with
unsubscribe freehaven-cvs       in the body. http://freehaven.net/