[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[or-cvs] cite the anonnet i meant to cite.
Update of /home/or/cvsroot/doc
In directory moria.mit.edu:/home2/arma/work/onion/cvs/doc
Modified Files:
tor-design.bib tor-design.tex
Log Message:
cite the anonnet i meant to cite.
Index: tor-design.bib
===================================================================
RCS file: /home/or/cvsroot/doc/tor-design.bib,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -d -r1.14 -r1.15
--- tor-design.bib 1 Nov 2003 03:40:20 -0000 1.14
+++ tor-design.bib 1 Nov 2003 08:05:21 -0000 1.15
@@ -20,8 +20,7 @@
@misc{eax,
author = "M. Bellare and P. Rogaway and D. Wagner",
title = "A conventional authenticated-encryption mode",
- text = "M. Bellare, P. Rogaway, and D. Wagner. A conventional authenticated-encryption
- mode. Manuscript, April 2003. www.cs.ucdavis.edu/\~{}rogaway",
+ howpublished = {Manuscript},
month = {April},
year = {2003},
}
@@ -35,13 +34,25 @@
@Misc{anonymizer,
key = {anonymizer},
title = {The {Anonymizer}},
- note = {\url{http://www.anonymizer.com/}}
+ note = {\url{http://anonymizer.com/}}
}
@Misc{privoxy,
key = {privoxy},
title = {{Privoxy}},
note = {\url{http://www.privoxy.org/}}
+}
+
+@inproceedings{RRMPH02-1,
+ title = {{Analysis of an Anonymity Network for Web Browsing}},
+ author = {Marc Rennhard and Sandro Rafaeli and Laurent Mathy and Bernhard Plattner and
+ David Hutchison},
+ booktitle = {{Proceedings of the IEEE 7th Intl. Workshop on Enterprise Security (WET ICE
+ 2002)}},
+ year = {2002},
+ month = {June},
+ address = {Pittsburgh, USA},
+ pages = {49--54},
}
@Misc{anonnet,
Index: tor-design.tex
===================================================================
RCS file: /home/or/cvsroot/doc/tor-design.tex,v
retrieving revision 1.48
retrieving revision 1.49
diff -u -d -r1.48 -r1.49
--- tor-design.tex 1 Nov 2003 07:52:51 -0000 1.48
+++ tor-design.tex 1 Nov 2003 08:05:21 -0000 1.49
@@ -333,7 +333,7 @@
public-key encrypted messages, each layer of which provides a set of session
keys and the address of the next server in the channel. Tor as described
herein, Tarzan, Morphmix, Cebolla \cite{cebolla}, and AnonNet
-\cite{anonnet} build the
+\cite{RRMPH02-1} build the
channel in stages, extending it one hop at a time. This approach
makes perfect forward secrecy feasible.
@@ -988,7 +988,7 @@
% In response, you send lots of 256 byte cells. Can I use this to
% make you exceed your outgoing bandwidth limit by a factor of 256?
-Further, inspired by Rennhard et al's design in \cite{anonnet}, a
+Further, inspired by Rennhard et al's design in \cite{RRMPH02-1}, a
circuit's edges heuristically distinguish interactive streams from bulk
streams by comparing the frequency with which they supply cells. We can
provide good latency for interactive streams by giving them preferential