[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
[freehaven-cvs] Fixed some typos, corrected bib errors.
Update of /home2/freehaven/cvsroot/doc/mixmaster-vs-reliable
In directory moria.mit.edu:/tmp/cvs-serv14723
Modified Files:
mixvreliable.tex
Log Message:
Fixed some typos, corrected bib errors.
Index: mixvreliable.tex
===================================================================
RCS file: /home2/freehaven/cvsroot/doc/mixmaster-vs-reliable/mixvreliable.tex,v
retrieving revision 1.7
retrieving revision 1.8
diff -u -d -r1.7 -r1.8
--- mixvreliable.tex 25 Mar 2004 22:53:58 -0000 1.7
+++ mixvreliable.tex 26 Mar 2004 06:07:51 -0000 1.8
@@ -73,7 +73,7 @@
input and an output messages by looking at the time the message arrived to
and left from the mix.
-The idea of mixes was introduced by Chaum \cite{chaum81untraceable}.
+The idea of mixes was introduced by Chaum \cite{chaum-mix}.
This first design was a \emph{threshold mix}, a mix that collects a
certain number of messages and then flushes them. Since then, variants on
this first design have been proposed in the literature. In this paper, we
@@ -82,7 +82,7 @@
providing anonymous email services since 1995.
The first design is called ``Mixmaster'' (as the remailer network) because
-it corresponds to the original design by Cottrell \cite{Cott94,Mix_prot}.
+it corresponds to the original design by Cottrell \cite{remailer-attacks,mixmaster-spec}.
The second design, called ``Reliable'', uses a different reordering
strategy.~\cite {RProcess} The details of the two remailers are explained
in the following sections. We compare version 3.0 of the Mixmaster
@@ -97,7 +97,7 @@
for the two protocols generally do not overlap, this does not impact
our results. The Cypherpunk remailer protocol is known to contain
numerous flaws, and should not be used if strong anonymity is
- required\cite{cottrell,mixminion}.}
+ required\cite{remailer-attacks,mixminion}.}
is a \emph{pool} mix. Pool mixes process the messages in batches. They
collect messages for some time, place them in the pool (memory of the
mix), and select some of them for flushing (in random order) when the
@@ -766,7 +766,7 @@
non-host based active attacks such as $(n-1)$ attacks. The anonymity
strength of a remailer should not require pool values to be hidden, and
countermeasures to this class of active attacks should be
-taken.~\footnote{rgb-mix}
+taken.~\cite{rgb-mix}
\section{Conclusions and future work}
***********************************************************************
To unsubscribe, send an e-mail to majordomo@seul.org with
unsubscribe freehaven-cvs in the body. http://freehaven.net/