gzz-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Gzz-commits] gzz/Documentation/misc/hemppah-progradu mastert...


From: Hermanni Hyytiälä
Subject: [Gzz-commits] gzz/Documentation/misc/hemppah-progradu mastert...
Date: Mon, 24 Mar 2003 05:26:10 -0500

CVSROOT:        /cvsroot/gzz
Module name:    gzz
Changes by:     Hermanni Hyytiälä <address@hidden>      03/03/24 05:26:10

Modified files:
        Documentation/misc/hemppah-progradu: masterthesis.tex 

Log message:
        Fix compile error

CVSWeb URLs:
http://savannah.gnu.org/cgi-bin/viewcvs/gzz/gzz/Documentation/misc/hemppah-progradu/masterthesis.tex.diff?tr1=1.174&tr2=1.175&r1=text&r2=text

Patches:
Index: gzz/Documentation/misc/hemppah-progradu/masterthesis.tex
diff -u gzz/Documentation/misc/hemppah-progradu/masterthesis.tex:1.174 
gzz/Documentation/misc/hemppah-progradu/masterthesis.tex:1.175
--- gzz/Documentation/misc/hemppah-progradu/masterthesis.tex:1.174      Mon Mar 
24 05:15:32 2003
+++ gzz/Documentation/misc/hemppah-progradu/masterthesis.tex    Mon Mar 24 
05:26:09 2003
@@ -511,7 +511,7 @@
 whether all proposed algorithms can preserve logarithmic efficiency and 
scalability properties 
 in real-life applications or not; several tightly structured systems
 assume that participating peers are homogeneous, and the rate of join or leave 
operation is low \cite{gurmeet03symphony,
-\cite{libennowell01observations}}.  
+libennowell01observations}.  
 
 To end user, the biggest difference between these systems is how data lookups 
are performed. Loosely
 structured systems provide more rich and user friendly way of searching data 
than tightly structured systems 
@@ -947,14 +947,14 @@
 peers (e.g., peer identifiers of a tightly structured system).
 
 Anonymity is widely used in a Peer-to-Peer system in which data publication 
and non-censorship are important. These include
-Forwarding proxies are used in Freenet \cite{clarke00freenet}, Crowds 
\cite{reiter98crowds} and Free Haven \cite{dingledine00free} 
+Forwarding proxies are used in Freenet \cite{clarke00freenet}, Crowds 
\cite{reiter98crowds} and Free Haven \cite{dingledine00free}
 in order to provide various types of anonymity. Tangler \cite{502002} and 
Publius \cite{pub00} use cryptographic sharing methods 
-to split data into fragments \cite{Shamir1979a}. Mix mailer networks, such as 
\cite{mixminionurl}, are commonly used in 
-distributed systems, which are able to provide some level of anonymity.
+to split data into fragments \cite{Shamir1979a}. Mix mailer networks (e.g., 
\cite{mixminionurl}) are commonly used in 
+distributed systems which are able to provide some level of anonymity (e.g., 
\cite{mneturl}).
 
 Even if many existing Peer-to-Peer systems are able to provide some of the 
types of anonymity, there is no
-such a system which is able to provide all kinds of anonymity as listed above. 
Specifically, the conflicts
-between anonymity and other Peer-to-Peer system properties require more 
research work.
+such a system which is able to provide all types of anonymity. Specifically, 
the conflicts
+between anonymity and other properties of Peer-to-Peer system require more 
research work.
 
 
 \subsection{Access control}




reply via email to

[Prev in Thread] Current Thread [Next in Thread]