소스 검색

a few more notes

svn:r1013
Roger Dingledine 20 년 전
부모
커밋
2c6fac7f7d
1개의 변경된 파일5개의 추가작업 그리고 3개의 파일을 삭제
  1. 5 3
      doc/tor-design.tex

+ 5 - 3
doc/tor-design.tex

@@ -1,3 +1,5 @@
+% XXX Cite SS03
+
 \documentclass[times,10pt,twocolumn]{article}
 \usepackage{latex8}
 \usepackage{times}
@@ -5,7 +7,7 @@
 \usepackage{graphics}
 \usepackage{amsmath}
 
-%\pagestyle{empty}
+\pagestyle{plain}
 
 \renewcommand\url{\begingroup \def\UrlLeft{<}\def\UrlRight{>}\urlstyle{tt}\Url}
 \newcommand\emailaddr{\begingroup \def\UrlLeft{<}\def\UrlRight{>}\urlstyle{tt}\Url}
@@ -1341,7 +1343,7 @@ the key and starts the rendezvous as described above.
 \subsection{Previous rendezvous work}
 
 Rendezvous points in low-latency anonymity systems were first
-described for use in ISDN telephony \cite{isdn-mixes,jerichow-jsac98}.
+described for use in ISDN telephony \cite{jerichow-jsac98,isdn-mixes}.
 Later low-latency designs used rendezvous points for hiding location
 of mobile phones and low-power location trackers
 \cite{federrath-ih96,reed-protocols97}.  Rendezvous for low-latency
@@ -1357,7 +1359,7 @@ via Diffie-Hellman, so plaintext is not exposed even at the rendezvous point. Th
 our design tries to minimize the exposure associated with running the
 service, to encourage volunteers to offer introduction and rendezvous
 point services. Tor's introduction points do not output any bytes to the
-clients, and the rendezvous points don't know the client or the server,
+clients; the rendezvous points don't know the client or the server,
 and can't read the data being transmitted. The indirection scheme is
 also designed to include authentication/authorization---if Alice doesn't
 include the right cookie with her request for service, Bob need not even