[or-cvs] cite the anonnet i meant to cite.
Roger Dingledine
arma at seul.org
Sat Nov 1 08:05:24 UTC 2003
Update of /home/or/cvsroot/doc
In directory moria.mit.edu:/home2/arma/work/onion/cvs/doc
Modified Files:
tor-design.bib tor-design.tex
Log Message:
cite the anonnet i meant to cite.
Index: tor-design.bib
===================================================================
RCS file: /home/or/cvsroot/doc/tor-design.bib,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -d -r1.14 -r1.15
--- tor-design.bib 1 Nov 2003 03:40:20 -0000 1.14
+++ tor-design.bib 1 Nov 2003 08:05:21 -0000 1.15
@@ -20,8 +20,7 @@
@misc{eax,
author = "M. Bellare and P. Rogaway and D. Wagner",
title = "A conventional authenticated-encryption mode",
- text = "M. Bellare, P. Rogaway, and D. Wagner. A conventional authenticated-encryption
- mode. Manuscript, April 2003. www.cs.ucdavis.edu/\~{}rogaway",
+ howpublished = {Manuscript},
month = {April},
year = {2003},
}
@@ -35,13 +34,25 @@
@Misc{anonymizer,
key = {anonymizer},
title = {The {Anonymizer}},
- note = {\url{http://www.anonymizer.com/}}
+ note = {\url{http://anonymizer.com/}}
}
@Misc{privoxy,
key = {privoxy},
title = {{Privoxy}},
note = {\url{http://www.privoxy.org/}}
+}
+
+ at inproceedings{RRMPH02-1,
+ title = {{Analysis of an Anonymity Network for Web Browsing}},
+ author = {Marc Rennhard and Sandro Rafaeli and Laurent Mathy and Bernhard Plattner and
+ David Hutchison},
+ booktitle = {{Proceedings of the IEEE 7th Intl. Workshop on Enterprise Security (WET ICE
+ 2002)}},
+ year = {2002},
+ month = {June},
+ address = {Pittsburgh, USA},
+ pages = {49--54},
}
@Misc{anonnet,
Index: tor-design.tex
===================================================================
RCS file: /home/or/cvsroot/doc/tor-design.tex,v
retrieving revision 1.48
retrieving revision 1.49
diff -u -d -r1.48 -r1.49
--- tor-design.tex 1 Nov 2003 07:52:51 -0000 1.48
+++ tor-design.tex 1 Nov 2003 08:05:21 -0000 1.49
@@ -333,7 +333,7 @@
public-key encrypted messages, each layer of which provides a set of session
keys and the address of the next server in the channel. Tor as described
herein, Tarzan, Morphmix, Cebolla \cite{cebolla}, and AnonNet
-\cite{anonnet} build the
+\cite{RRMPH02-1} build the
channel in stages, extending it one hop at a time. This approach
makes perfect forward secrecy feasible.
@@ -988,7 +988,7 @@
% In response, you send lots of 256 byte cells. Can I use this to
% make you exceed your outgoing bandwidth limit by a factor of 256?
-Further, inspired by Rennhard et al's design in \cite{anonnet}, a
+Further, inspired by Rennhard et al's design in \cite{RRMPH02-1}, a
circuit's edges heuristically distinguish interactive streams from bulk
streams by comparing the frequency with which they supply cells. We can
provide good latency for interactive streams by giving them preferential
More information about the tor-commits
mailing list