Internet censorship circumvention

Results: 41



#Item
11  SoK: Towards Grounding Censorship Circumvention in Empiricism Michael Carl Tschantz∗ , Sadia Afroz∗ , Anonymous‡ , and Vern Paxson∗† ∗ International Computer Science Institute

1 SoK: Towards Grounding Censorship Circumvention in Empiricism Michael Carl Tschantz∗ , Sadia Afroz∗ , Anonymous‡ , and Vern Paxson∗† ∗ International Computer Science Institute

Add to Reading List

Source URL: internet-freedom-science.org

Language: English - Date: 2016-04-13 13:52:54
2How the Great Firewall of China is Blocking Tor Philipp Winter and Stefan Lindskog Karlstad University {philwint, steflind}@kau.se  Abstract

How the Great Firewall of China is Blocking Tor Philipp Winter and Stefan Lindskog Karlstad University {philwint, steflind}@kau.se Abstract

Add to Reading List

Source URL: www.cs.kau.se

Language: English
3PrivEx: Private Collection of Traffic Statistics for Anonymous Communication Networks ∗ Tariq Elahi

PrivEx: Private Collection of Traffic Statistics for Anonymous Communication Networks ∗ Tariq Elahi

Add to Reading List

Source URL: www0.cs.ucl.ac.uk

Language: English
4Research Brief March 2014 The Citizen Lab  Maliciously Repackaged Psiphon Found

Research Brief March 2014 The Citizen Lab Maliciously Repackaged Psiphon Found

Add to Reading List

Source URL: citizenlab.org

Language: English - Date: 2015-03-18 14:57:30
5How the Great Firewall of China is Blocking Tor Philipp Winter and Stefan Lindskog Karlstad University {philwint, steflind}@kau.se  Abstract

How the Great Firewall of China is Blocking Tor Philipp Winter and Stefan Lindskog Karlstad University {philwint, steflind}@kau.se Abstract

Add to Reading List

Source URL: www.usenix.org

Language: English
6Cover Your ACKs: Pitfalls of Covert Channel Censorship Circumvention John Geddes Max Schuchard

Cover Your ACKs: Pitfalls of Covert Channel Censorship Circumvention John Geddes Max Schuchard

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2013-09-04 16:00:20
7rBridge: User Reputation based Tor Bridge Distribution with Privacy Preservation Qiyan Wang Department of Computer Science University of Illinois at Urbana-Champaign

rBridge: User Reputation based Tor Bridge Distribution with Privacy Preservation Qiyan Wang Department of Computer Science University of Illinois at Urbana-Champaign

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2012-12-18 10:55:02
8Censorship Resistance as a Side-Effect Henry Tan Georgetown University Washington, DC USA  Micah Sherr

Censorship Resistance as a Side-Effect Henry Tan Georgetown University Washington, DC USA Micah Sherr

Add to Reading List

Source URL: security.cs.georgetown.edu

Language: English - Date: 2014-03-31 17:22:53
9

PDF Document

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2015-05-16 21:58:42
10Technical analysis of the Ultrasurf proxying software Jacob Appelbaum  The Tor Project Abstract Ultrasurf is a proxy-based program promoted for Internet censorship circumvention. This report gives a t

Technical analysis of the Ultrasurf proxying software Jacob Appelbaum The Tor Project Abstract Ultrasurf is a proxy-based program promoted for Internet censorship circumvention. This report gives a t

Add to Reading List

Source URL: media.torproject.org

Language: English - Date: 2012-04-16 15:36:36