diff options
author | Roger Dingledine <arma@torproject.org> | 2003-11-01 08:05:21 +0000 |
---|---|---|
committer | Roger Dingledine <arma@torproject.org> | 2003-11-01 08:05:21 +0000 |
commit | a7aac2cc6178c92d965d7d0a9612fdb39e7340df (patch) | |
tree | 52eff70373509b3113ea6b2b661487b1625a1b6e /doc | |
parent | 6a909560be4419dd8bc4b8d21c1f2ea4a9b2293f (diff) | |
download | tor-a7aac2cc6178c92d965d7d0a9612fdb39e7340df.tar.gz tor-a7aac2cc6178c92d965d7d0a9612fdb39e7340df.zip |
cite the anonnet i meant to cite.
svn:r704
Diffstat (limited to 'doc')
-rw-r--r-- | doc/tor-design.bib | 17 | ||||
-rw-r--r-- | doc/tor-design.tex | 4 |
2 files changed, 16 insertions, 5 deletions
diff --git a/doc/tor-design.bib b/doc/tor-design.bib index da99500363..595091a742 100644 --- a/doc/tor-design.bib +++ b/doc/tor-design.bib @@ -20,8 +20,7 @@ @misc{eax, author = "M. Bellare and P. Rogaway and D. Wagner", title = "A conventional authenticated-encryption mode", - text = "M. Bellare, P. Rogaway, and D. Wagner. A conventional authenticated-encryption - mode. Manuscript, April 2003. www.cs.ucdavis.edu/\~{}rogaway", + howpublished = {Manuscript}, month = {April}, year = {2003}, } @@ -35,7 +34,7 @@ @Misc{anonymizer, key = {anonymizer}, title = {The {Anonymizer}}, - note = {\url{http://www.anonymizer.com/}} + note = {\url{http://anonymizer.com/}} } @Misc{privoxy, @@ -44,6 +43,18 @@ note = {\url{http://www.privoxy.org/}} } +@inproceedings{RRMPH02-1, + title = {{Analysis of an Anonymity Network for Web Browsing}}, + author = {Marc Rennhard and Sandro Rafaeli and Laurent Mathy and Bernhard Plattner and + David Hutchison}, + booktitle = {{Proceedings of the IEEE 7th Intl. Workshop on Enterprise Security (WET ICE + 2002)}}, + year = {2002}, + month = {June}, + address = {Pittsburgh, USA}, + pages = {49--54}, +} + @Misc{anonnet, key = {anonnet}, title = {{AnonNet}}, diff --git a/doc/tor-design.tex b/doc/tor-design.tex index 7e39dec71c..2e2a414dcf 100644 --- a/doc/tor-design.tex +++ b/doc/tor-design.tex @@ -333,7 +333,7 @@ build the anonymous channel all at once, using a layered ``onion'' of public-key encrypted messages, each layer of which provides a set of session keys and the address of the next server in the channel. Tor as described herein, Tarzan, Morphmix, Cebolla \cite{cebolla}, and AnonNet -\cite{anonnet} build the +\cite{RRMPH02-1} build the channel in stages, extending it one hop at a time. This approach makes perfect forward secrecy feasible. @@ -988,7 +988,7 @@ incoming bytes. % In response, you send lots of 256 byte cells. Can I use this to % make you exceed your outgoing bandwidth limit by a factor of 256? -Further, inspired by Rennhard et al's design in \cite{anonnet}, a +Further, inspired by Rennhard et al's design in \cite{RRMPH02-1}, a circuit's edges heuristically distinguish interactive streams from bulk streams by comparing the frequency with which they supply cells. We can provide good latency for interactive streams by giving them preferential |