[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[freehaven-cvs] Minor changes to section headings per request from P...
Update of /home/freehaven/cvsroot/doc/fc03
In directory moria.seul.org:/tmp/cvs-serv18775
Modified Files:
econymics.tex
Log Message:
Minor changes to section headings per request from Paul's boss
Index: econymics.tex
===================================================================
RCS file: /home/freehaven/cvsroot/doc/fc03/econymics.tex,v
retrieving revision 1.40
retrieving revision 1.41
diff -u -d -r1.40 -r1.41
--- econymics.tex 17 Sep 2002 03:43:17 -0000 1.40
+++ econymics.tex 2 Oct 2002 22:10:31 -0000 1.41
@@ -449,7 +449,7 @@
plus the expected losses for losing anonymity after the investment are less
than the expected losses from not sending the message at all.
-\section{Applying the model}
+\section{Applying The Model}
\label{sec:application}
@@ -505,7 +505,7 @@
thus a typical starting point of anonymity analyses.
% FIXME say more
-\subsection{Honest agents}
+\subsection{Honest Agents}
If a user only sends messages, the cost of using the anonymous service
is $c_{s}$. This cost might be higher than using the non-anonymous channel, $%
@@ -804,7 +804,7 @@
possible solutions to reduce coordination costs. We now consider some
other mechanisms that can make these systems economically viable.
-\section{Alternate incentive mechanisms}
+\section{Alternate Incentive Mechanisms}
\label{sec:alternate-incentives}
@@ -900,11 +900,11 @@
%the next section.
\end{enumerate}
-\section{A few more roadblocks}
+\section{A Few More Roadblocks}
\label{sec:roadblocks}
-\subsection{Authentication in a volunteer economy}
+\subsection{Authentication in a Volunteer Economy}
Our discussions so far indicate that it may in fact be plausible to build a
strong anonymity infrastructure from a wide-spread group of independent
@@ -932,7 +932,7 @@
Another potential solution, a global PKI to ensure unique identities, is
unlikely to emerge any time soon.
-\subsection{Dishonest nodes vs lazy nodes}
+\subsection{Dishonest Nodes vs Lazy Nodes}
We have primarily focused on the strategic motivations of honest agents,
but the motivations of dishonest agents are at least as important. An
@@ -981,7 +981,7 @@
dangerous they are, and whether economic incentives or technical answers are
the best way to counter them.
-\subsection{Bootstrapping the system and perceived costs}
+\subsection{Bootstrapping The System And Perceived Costs}
\label{sec:bootstrapping}
Our models so far have considered the strategic choices of agents facing an
@@ -1038,7 +1038,7 @@
mechanisms discussed in Section \ref{sec:alternate-incentives} preferrable
to a market-only solution.
-\subsection{Customization and preferential service are risky too}
+\subsection{Customization And Preferential Service Are Risky Too}
Leaving security decisions up to the user is traditionally a way to transfer
cost or liability from the vendor to the customer; but in strong anonymity
***********************************************************************
To unsubscribe, send an e-mail to majordomo@seul.org with
unsubscribe freehaven-cvs in the body. http://freehaven.net/