[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[freehaven-cvs] clean up for presentation and grammar



Update of /home/freehaven/cvsroot/doc/fc04
In directory moria.mit.edu:/home2/arma/work/freehaven/doc/fc04

Modified Files:
	minion-systems.bib minion-systems.tex 
Log Message:
clean up for presentation and grammar


Index: minion-systems.bib
===================================================================
RCS file: /home/freehaven/cvsroot/doc/fc04/minion-systems.bib,v
retrieving revision 1.4
retrieving revision 1.5
diff -u -d -r1.4 -r1.5
--- minion-systems.bib	9 Sep 2003 04:33:03 -0000	1.4
+++ minion-systems.bib	9 Sep 2003 20:23:21 -0000	1.5
@@ -35,7 +35,7 @@
   year = {2002}, 
   month = {November}, 
   address = {Washington, DC, USA}, 
-  note = {\url{http://www.tik.ee.ethz.ch/~rennhard/publications/morphmix.pdf}},
+  note = {\url{http://www.tik.ee.ethz.ch/\~{}rennhard/publications/morphmix.pdf}},
 }
 
 @inproceedings{econymics,
@@ -55,7 +55,7 @@
   booktitle = {Proceedings of the 2003 IEEE Symposium on Security and Privacy}, 
   year = {2003}, 
   month = {May}, 
-  note = {\url{http://mixminion.net/minion-design.pdf}},
+  note = {\newline \url{http://mixminion.net/minion-design.pdf}},
 }
 
 @inproceedings{rao-pseudonymity,
@@ -287,64 +287,10 @@
    year =        2000,
    editor =       {H. Federrath},
    publisher =    {Springer-Verlag, LNCS 2009},
-   note =        {\url{http://www.tik.ee.ethz.ch/~weiler/lehre/netsec/Unterlagen/anon/
+   note =        {\url{http://www.tik.ee.ethz.ch/\~{}weiler/lehre/netsec/Unterlagen/anon/
                        disadvantages_berthold.pdf}},
 }
 
-@InProceedings{boneh00,
-   author =      {Dan Boneh and Moni Naor},
-   title =       {Timed Commitments},
-   booktitle =   {Advances in Cryptology -- {CRYPTO} 2000},
-   pages =       {236--254},
-   year =        2000,
-   publisher =   {Springer-Verlag, LNCS 1880},
-   note =        {\newline \url{http://crypto.stanford.edu/~dabo/abstracts/timedcommit.html}},
-}
-
-@InProceedings{goldschlag98,
-   author =      {David M. Goldschlag and Stuart G. Stubblebine},
-   title =       {Publicly Verifiable Lotteries: Applications of
-                  Delaying Functions},
-   booktitle =   {Financial Cryptography, FC'98},
-   pages =       {214--226},
-   year =        1998,
-   publisher =   {Springer-Verlag, LNCS 1465},
-   note =        {\newline \url{http://citeseer.nj.nec.com/goldschlag98publicly.html}},
-}
-
-@InProceedings{syverson98,
-   author =      {Paul Syverson},
-   title =       {Weakly Secret Bit Commitment: Applications to
-                  Lotteries and Fair Exchange},
-   booktitle =   {Computer Security Foundations Workshop (CSFW11)},
-   pages =       {2--13},
-   year =        1998,
-   address =     {Rockport Massachusetts},
-   month =       {June},
-   publisher =   {IEEE CS Press},
-   note =        {\newline \url{http://chacs.nrl.navy.mil/publications/CHACS/1998/}},
-}
-
-@Misc{shoup-iso,
-   author =      {Victor Shoup},
-   title =       {A Proposal for an {ISO} {S}tandard for Public Key Encryption (version 2.1)},
-   note =        {Revised December 20, 2001. \url{http://www.shoup.net/papers/}},
-}
-
-@Misc{shoup-oaep,
-   author =      {Victor Shoup},
-   title =       {{OAEP} Reconsidered},
-   howpublished = {{IACR} e-print 2000/060},
-   note =        {\newline \url{http://eprint.iacr.org/2000/060/}},
-}
-
-@Misc{oaep-still-alive,
-   author =      {E. Fujisaki and D. Pointcheval and T. Okamoto and J. Stern},
-   title =       {{RSA}-{OAEP} is Still Alive!},
-   howpublished = {{IACR} e-print 2000/061},
-   note =        {\newline \url{http://eprint.iacr.org/2000/061/}},
-}
-
 @misc{echolot,
   author = {Peter Palfrader},
   title = {Echolot: a pinger for anonymous remailers},
@@ -354,7 +300,7 @@
 @Misc{mixmaster-attacks,
    author =      {Lance Cottrell},
    title =       {Mixmaster and Remailer Attacks},
-   note =        {\url{http://www.obscura.com/~loki/remailer/remailer-essay.html}},
+   note =        {\url{http://www.obscura.com/\~{}loki/remailer/remailer-essay.html}},
 }
 
 @misc{mixmaster-spec,
@@ -379,7 +325,7 @@
 @Misc{hashcash,
    author =      {Adam Back},
    title =       {Hash cash},
-   note =        {\newline \url{http://www.cypherspace.org/~adam/hashcash/}},
+   note =        {\newline \url{http://www.cypherspace.org/\~{}adam/hashcash/}},
 }
 
 @InProceedings{oreilly-acc,
@@ -453,16 +399,6 @@
   note = {\url{http://citeseer.nj.nec.com/492015.html}},
 }
 
-@InProceedings{kesdogan,
-   author =      {D. Kesdogan and M. Egner and T. B\"uschkes},
-   title =       {Stop-and-Go {MIX}es Providing Probabilistic Anonymity in an Open 
-                  System},
-   booktitle =   {Information Hiding (IH 1998)},
-   year =        {1998},
-   publisher =   {Springer-Verlag, LNCS 1525},
-   note =        {\url{http://www.cl.cam.ac.uk/~fapp2/ihw98/ihw98-sgmix.pdf}},
-}
-
 @InProceedings{flash-mix,
    author =      {Markus Jakobsson},
    title =       {Flash {M}ixing},
@@ -543,7 +479,7 @@
    volume =      {4},
    number =      {2},
    month =       {February},
-   note =        {\url{http://www.eskimo.com/~weidai/mix-net.txt}},
+   note =        {\url{http://www.eskimo.com/\~{}weidai/mix-net.txt}},
 }
 
 @InProceedings{nym-alias-net,
@@ -554,13 +490,7 @@
                   Communications Security (CCS'98)},
   year =         1998,
   publisher =    {ACM Press},
-  note =        {\newline \url{http://www.scs.cs.nyu.edu/~dm/}},
-}
-
-@Misc{timmay,
-   author =      {Tim May},
-   title =       {Cyphernomicon},
-   note =        {\newline \url{http://www2.pro-ns.net/~crypto/cyphernomicon.html}},
+  note =        {\newline \url{http://www.scs.cs.nyu.edu/\~{}dm/}},
 }
 
 @misc{neochaum,
@@ -573,7 +503,7 @@
 @misc{pidaho,
    author =      {Joel McNamara},
    title =       {{P}rivate {I}daho},
-   note =        {\newline \url{http://www.eskimo.com/~joelm/pi.html}},
+   note =        {\newline \url{http://www.eskimo.com/\~{}joelm/pi.html}},
 }
 
 @misc{potato,
@@ -591,7 +521,7 @@
 @misc{mix-stats,
    author =      {Christian Mock},
    title =       {Mixmaster Stats ({A}ustria)}, 
-   note =        {\newline \url{http://www.tahina.priv.at/~cm/stats/mlist2.html}},
+   note =        {\newline \url{http://www.tahina.priv.at/\~{}cm/stats/mlist2.html}},
 }
 
 @InProceedings{garay97secure,
@@ -645,12 +575,6 @@
 }
 
 
-@Misc{recovery,
-   author =      {Miguel Castro and Barbara Liskov}, 
-   title =       {Proactive Recovery in a Byzantine-Fault-Tolerant System},
-   note =        {\newline \url{http://www.pmg.lcs.mit.edu/~castro/application/recovery.pdf}},
-}
-
 @Misc{advogato,
    author =      {Raph Levien}, 
    title =       {Advogato's Trust Metric},
@@ -667,14 +591,6 @@
    number =      {2},
    series =      {335--348},
    month =       {April},
-}
-
-@PhdThesis{malkin-thesis,
-   author =      {Tal Malkin},
-   school =      {{MIT}},
-   title =       {Private {I}nformation {R}etrieval},
-   year =        {2000},
-   note =        {\newline \url{http://toc.lcs.mit.edu/~tal/pubs.html}}
 }
 
 @Misc{zks,

Index: minion-systems.tex
===================================================================
RCS file: /home/freehaven/cvsroot/doc/fc04/minion-systems.tex,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -d -r1.7 -r1.8
--- minion-systems.tex	9 Sep 2003 18:33:40 -0000	1.7
+++ minion-systems.tex	9 Sep 2003 20:23:21 -0000	1.8
@@ -116,7 +116,7 @@
 correctly hides the correlation between incoming and outgoing messages,
 an eavesdropper should not be able to connect senders to recipients.
 
-The first widespread public implementations of mixes was produced by
+The first widespread public implementations of mixes were produced by
 contributors to the Cypherpunks mailing list. These ``Type I''
 \emph{anonymous remailers}
 were inspired both by the problems surrounding the {\tt anon.penet.fi}
@@ -137,7 +137,7 @@
 Anonymizer \cite{anonymizer}, to distributed sets of servers like Freedom
 \cite{freedom2-arch} and Onion Routing \cite{onion-routing:pet2000},
 to totally decentralized p2p networks like Tarzan \cite{tarzan:ccs02}
-and Morphmix \cite{morphmix:wpes2002}.  But while these system are
+and Morphmix \cite{morphmix:wpes2002}.  But while these systems are
 more suitable than mixes for low-latency applications such as web browsing,
 chatting, and VoIP, they are more vulnerable to certain attacks than
 are traditional high-latency mix-net designs.  Specifically, if an
@@ -173,14 +173,14 @@
 \item {\bf Integrated directory design.}  Earlier deployed mix-nets
   have left the issue of mix discovery to a set of unspecified,
   uncoordinated, out-of-band keyservers.  Type III introduces
-  synchonized directory servers to sign mix directories and avoid
+  synchronized directory servers to sign mix directories and avoid
   single-point-of-failure issues.
 \item {\bf Integrated key rotation.}  Under Type I and Type II, key
   rotation occurs out of band, when a mix's administrator publicly
   announces a new key and tries to persuade other mixes and users to
-  stop using the old key.  This process can take weeks to months.  In
-  Type III, mixes publish new keys to directories so that clients can
-  retrieve them automatically, thus making key rotation practical.
+  stop using the old key.  This process can take weeks to months.
+  Type III's key rotation is more practical: mixes publish new keys to
+  directories so that clients can retrieve them automatically.
 \item {\bf Dummy traffic.} Type III introduces a simple cover traffic
   design to complicate traffic analysis within the network.
 \end{itemize}

***********************************************************************
To unsubscribe, send an e-mail to majordomo@seul.org with
unsubscribe freehaven-cvs       in the body. http://freehaven.net/