aboutsummaryrefslogtreecommitdiff
path: root/doc
diff options
context:
space:
mode:
authorng0 <ng0@n0.is>2019-02-22 11:12:15 +0000
committerng0 <ng0@n0.is>2019-02-22 11:12:15 +0000
commitff143daaf2085ac3ae4f140f0e6fe51e4a9908fc (patch)
tree9097b80e24a736990031f657019565848a1646d6 /doc
parent00e11523dd113b46522ba1edbd8d2faae99976da (diff)
downloadgnunet-ff143daaf2085ac3ae4f140f0e6fe51e4a9908fc.tar.gz
gnunet-ff143daaf2085ac3ae4f140f0e6fe51e4a9908fc.zip
fix URLs in chapter keyconcepts
Diffstat (limited to 'doc')
-rw-r--r--doc/handbook/chapters/keyconcepts.texi12
1 files changed, 6 insertions, 6 deletions
diff --git a/doc/handbook/chapters/keyconcepts.texi b/doc/handbook/chapters/keyconcepts.texi
index b4a60024c..829fed82e 100644
--- a/doc/handbook/chapters/keyconcepts.texi
+++ b/doc/handbook/chapters/keyconcepts.texi
@@ -88,7 +88,7 @@ Ronaldo A. Ferreira, Christian Grothoff, and Paul Ruth.
88A Transport Layer Abstraction for Peer-to-Peer Networks 88A Transport Layer Abstraction for Peer-to-Peer Networks
89Proceedings of the 3rd International Symposium on Cluster Computing 89Proceedings of the 3rd International Symposium on Cluster Computing
90and the Grid (GRID 2003), 2003. 90and the Grid (GRID 2003), 2003.
91(@uref{https://gnunet.org/git/bibliography.git/plain/docs/transport.pdf, https://gnunet.org/git/bibliography.git/plain/docs/transport.pdf}) 91(@uref{https://git.gnunet.org/bibliography.git/plain/docs/transport.pdf, https://git.gnunet.org/bibliography.git/plain/docs/transport.pdf})
92 92
93@cindex Accounting to Encourage Resource Sharing 93@cindex Accounting to Encourage Resource Sharing
94@node Accounting to Encourage Resource Sharing 94@node Accounting to Encourage Resource Sharing
@@ -125,7 +125,7 @@ the network load is high.
125For more information, refer to the following paper: 125For more information, refer to the following paper:
126Christian Grothoff. An Excess-Based Economic Model for Resource 126Christian Grothoff. An Excess-Based Economic Model for Resource
127Allocation in Peer-to-Peer Networks. Wirtschaftsinformatik, June 2003. 127Allocation in Peer-to-Peer Networks. Wirtschaftsinformatik, June 2003.
128(@uref{https://gnunet.org/git/bibliography.git/plain/docs/ebe.pdf, https://gnunet.org/git/bibliography.git/plain/docs/ebe.pdf}) 128(@uref{https://git.gnunet.org/bibliography.git/plain/docs/ebe.pdf, https://git.gnunet.org/bibliography.git/plain/docs/ebe.pdf})
129 129
130@cindex Confidentiality 130@cindex Confidentiality
131@node Confidentiality 131@node Confidentiality
@@ -162,7 +162,7 @@ scientific metrics
162(Claudia Díaz, Stefaan Seys, Joris Claessens, 162(Claudia Díaz, Stefaan Seys, Joris Claessens,
163and Bart Preneel. Towards measuring anonymity. 163and Bart Preneel. Towards measuring anonymity.
1642002. 1642002.
165(@uref{https://gnunet.org/git/bibliography.git/plain/docs/article-89.pdf, https://gnunet.org/git/bibliography.git/plain/docs/article-89.pdf})) 165(@uref{https://git.gnunet.org/bibliography.git/plain/docs/article-89.pdf, https://git.gnunet.org/bibliography.git/plain/docs/article-89.pdf}))
166that can help quantify the level of anonymity that a given mechanism 166that can help quantify the level of anonymity that a given mechanism
167provides, there is no such thing as "complete anonymity". 167provides, there is no such thing as "complete anonymity".
168GNUnet's file-sharing implementation allows users to select for each 168GNUnet's file-sharing implementation allows users to select for each
@@ -225,7 +225,7 @@ Refer to the following paper for more:
225Krista Bennett and Christian Grothoff. 225Krista Bennett and Christian Grothoff.
226GAP --- practical anonymous networking. In Proceedings of 226GAP --- practical anonymous networking. In Proceedings of
227Designing Privacy Enhancing Technologies, 2003. 227Designing Privacy Enhancing Technologies, 2003.
228(@uref{https://gnunet.org/git/bibliography.git/plain/docs/aff.pdf, https://gnunet.org/git/bibliography.git/plain/docs/aff.pdf}) 228(@uref{https://git.gnunet.org/bibliography.git/plain/docs/aff.pdf, https://git.gnunet.org/bibliography.git/plain/docs/aff.pdf})
229 229
230@cindex Deniability 230@cindex Deniability
231@node Deniability 231@node Deniability
@@ -253,7 +253,7 @@ Christian Grothoff, Krista Grothoff, Tzvetan Horozov,
253and Jussi T. Lindgren. 253and Jussi T. Lindgren.
254An Encoding for Censorship-Resistant Sharing. 254An Encoding for Censorship-Resistant Sharing.
2552009. 2552009.
256(@uref{https://gnunet.org/git/bibliography.git/plain/docs/ecrs.pdf, https://gnunet.org/git/bibliography.git/plain/docs/ecrs.pdf}) 256(@uref{https://git.gnunet.org/bibliography.git/plain/docs/ecrs.pdf, https://git.gnunet.org/bibliography.git/plain/docs/ecrs.pdf})
257 257
258@cindex Peer Identities 258@cindex Peer Identities
259@node Peer Identities 259@node Peer Identities
@@ -284,7 +284,7 @@ GNS (Matthias Wachs, Martin Schanzenbach, and Christian Grothoff.
284A Censorship-Resistant, Privacy-Enhancing and Fully Decentralized Name 284A Censorship-Resistant, Privacy-Enhancing and Fully Decentralized Name
285System. In proceedings of 13th International Conference on Cryptology and 285System. In proceedings of 13th International Conference on Cryptology and
286Network Security (CANS 2014). 2014. 286Network Security (CANS 2014). 2014.
287@uref{https://gnunet.org/git/bibliography.git/plain/docs/gns2014wachs.pdf, https://gnunet.org/git/bibliography.git/plain/docs/gns2014wachs.pdf}) 287@uref{https://git.gnunet.org/bibliography.git/plain/docs/gns2014wachs.pdf, https://git.gnunet.org/bibliography.git/plain/docs/gns2014wachs.pdf})
288zones are similar to those of DNS zones, but instead of a hierarchy of 288zones are similar to those of DNS zones, but instead of a hierarchy of
289authorities to governing their use, GNS zones are controlled by a private 289authorities to governing their use, GNS zones are controlled by a private
290key. 290key.