[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[freehaven-cvs] Minor changes to section headings per request from P...



Update of /home/freehaven/cvsroot/doc/fc03
In directory moria.seul.org:/tmp/cvs-serv18775

Modified Files:
	econymics.tex 
Log Message:
Minor changes to section headings per request from Paul's boss


Index: econymics.tex
===================================================================
RCS file: /home/freehaven/cvsroot/doc/fc03/econymics.tex,v
retrieving revision 1.40
retrieving revision 1.41
diff -u -d -r1.40 -r1.41
--- econymics.tex	17 Sep 2002 03:43:17 -0000	1.40
+++ econymics.tex	2 Oct 2002 22:10:31 -0000	1.41
@@ -449,7 +449,7 @@
 plus the expected losses for losing anonymity after the investment are less
 than the expected losses from not sending the message at all.
 
-\section{Applying the model}
+\section{Applying The Model}
 
 \label{sec:application}
 
@@ -505,7 +505,7 @@
 thus a typical starting point of anonymity analyses.
 % FIXME say more
 
-\subsection{Honest agents}
+\subsection{Honest Agents}
 
 If a user only sends messages, the cost of using the anonymous service
 is $c_{s}$. This cost might be higher than using the non-anonymous channel, $%
@@ -804,7 +804,7 @@
 possible solutions to reduce coordination costs. We now consider some
 other mechanisms that can make these systems economically viable.
 
-\section{Alternate incentive mechanisms}
+\section{Alternate Incentive Mechanisms}
 
 \label{sec:alternate-incentives}
 
@@ -900,11 +900,11 @@
 %the next section.
 \end{enumerate}
 
-\section{A few more roadblocks}
+\section{A Few More Roadblocks}
 
 \label{sec:roadblocks}
 
-\subsection{Authentication in a volunteer economy}
+\subsection{Authentication in a Volunteer Economy}
 
 Our discussions so far indicate that it may in fact be plausible to build a
 strong anonymity infrastructure from a wide-spread group of independent
@@ -932,7 +932,7 @@
 Another potential solution, a global PKI to ensure unique identities, is
 unlikely to emerge any time soon.
 
-\subsection{Dishonest nodes vs lazy nodes}
+\subsection{Dishonest Nodes vs Lazy Nodes}
 
 We have primarily focused on the strategic motivations of honest agents,
 but the motivations of dishonest agents are at least as important. An
@@ -981,7 +981,7 @@
 dangerous they are, and whether economic incentives or technical answers are
 the best way to counter them.
 
-\subsection{Bootstrapping the system and perceived costs}
+\subsection{Bootstrapping The System And Perceived Costs}
 \label{sec:bootstrapping}
 
 Our models so far have considered the strategic choices of agents facing an
@@ -1038,7 +1038,7 @@
 mechanisms discussed in Section \ref{sec:alternate-incentives} preferrable
 to a market-only solution.
 
-\subsection{Customization and preferential service are risky too}
+\subsection{Customization And Preferential Service Are Risky Too}
 
 Leaving security decisions up to the user is traditionally a way to transfer
 cost or liability from the vendor to the customer; but in strong anonymity

***********************************************************************
To unsubscribe, send an e-mail to majordomo@seul.org with
unsubscribe freehaven-cvs       in the body. http://freehaven.net/