[or-cvs] cite the anonnet i meant to cite.

Roger Dingledine arma at seul.org
Sat Nov 1 08:05:24 UTC 2003


Update of /home/or/cvsroot/doc
In directory moria.mit.edu:/home2/arma/work/onion/cvs/doc

Modified Files:
	tor-design.bib tor-design.tex 
Log Message:
cite the anonnet i meant to cite.


Index: tor-design.bib
===================================================================
RCS file: /home/or/cvsroot/doc/tor-design.bib,v
retrieving revision 1.14
retrieving revision 1.15
diff -u -d -r1.14 -r1.15
--- tor-design.bib	1 Nov 2003 03:40:20 -0000	1.14
+++ tor-design.bib	1 Nov 2003 08:05:21 -0000	1.15
@@ -20,8 +20,7 @@
 @misc{eax,
   author = "M. Bellare and P. Rogaway and D. Wagner",
   title = "A conventional authenticated-encryption mode",
-  text = "M. Bellare, P. Rogaway, and D. Wagner. A conventional authenticated-encryption
-    mode. Manuscript, April 2003. www.cs.ucdavis.edu/\~{}rogaway",
+  howpublished = {Manuscript},
   month = {April},
   year = {2003},
 }
@@ -35,13 +34,25 @@
 @Misc{anonymizer,
   key =          {anonymizer},
   title =        {The {Anonymizer}},
-  note =         {\url{http://www.anonymizer.com/}}
+  note =         {\url{http://anonymizer.com/}}
 }
 
 @Misc{privoxy,
   key =          {privoxy},
   title =        {{Privoxy}},
   note =         {\url{http://www.privoxy.org/}}
+}
+
+ at inproceedings{RRMPH02-1,
+  title = {{Analysis of an Anonymity Network for Web Browsing}}, 
+  author = {Marc Rennhard and Sandro Rafaeli and Laurent Mathy and Bernhard Plattner and
+        David Hutchison}, 
+  booktitle = {{Proceedings of the IEEE 7th Intl. Workshop on Enterprise Security (WET ICE
+        2002)}}, 
+  year = {2002}, 
+  month = {June}, 
+  address = {Pittsburgh, USA}, 
+  pages = {49--54}, 
 }
 
 @Misc{anonnet,

Index: tor-design.tex
===================================================================
RCS file: /home/or/cvsroot/doc/tor-design.tex,v
retrieving revision 1.48
retrieving revision 1.49
diff -u -d -r1.48 -r1.49
--- tor-design.tex	1 Nov 2003 07:52:51 -0000	1.48
+++ tor-design.tex	1 Nov 2003 08:05:21 -0000	1.49
@@ -333,7 +333,7 @@
 public-key encrypted messages, each layer of which provides a set of session
 keys and the address of the next server in the channel.  Tor as described
 herein, Tarzan, Morphmix, Cebolla \cite{cebolla}, and AnonNet
-\cite{anonnet} build the
+\cite{RRMPH02-1} build the
 channel in stages, extending it one hop at a time. This approach
 makes perfect forward secrecy feasible.
 
@@ -988,7 +988,7 @@
 % In response, you send lots of 256 byte cells.  Can I use this to 
 % make you exceed your outgoing bandwidth limit by a factor of 256?
 
-Further, inspired by Rennhard et al's design in \cite{anonnet}, a
+Further, inspired by Rennhard et al's design in \cite{RRMPH02-1}, a
 circuit's edges heuristically distinguish interactive streams from bulk
 streams by comparing the frequency with which they supply cells.  We can
 provide good latency for interactive streams by giving them preferential



More information about the tor-commits mailing list