USENIX

Results: 1311



#Item
21Computing / Internet privacy / Software / Technology / Internet censorship / Text messaging / Email / Internet censorship circumvention / Freenet / Deep packet inspection / Steganography / SMS

Chipping Away at Censorship Firewalls with User-Generated Content Sam Burnett, Nick Feamster, and Santosh Vempala School of Computer Science, Georgia Tech {sburnett, feamster, vempala}@cc.gatech.edu Abstract

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2010-06-03 17:05:03
22Unix / System administration / USENIX / ACM SIGOPS / Computing / Information technology

usenix_logo_notag_full_color__white_texttm

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2018-03-08 20:35:23
23Geographic data and information / Aditya Akella / OMB Circular A-16 / USENIX / Seshan / Computing / Information

Message from the NSDI ’18 Program Co-Chairs Welcome to NSDI ’18! Over the years, NSDI has established itself as the top venue for work on networked and distributed systems. This year’s iteration is no exception, an

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2018-03-08 20:36:01
24Higher education in China / Computer science / Ion Stoica / Science and technology in the United States / Databricks / Ali Ghodsi / Matei Zaharia / Hari Balakrishnan / Scott Shenker / Tsinghua University / Microsoft Research / Carnegie Mellon University

NSDI ’16: 13th USENIX Symposium on Networked Systems Design and Implementation March 16–18, 2016 Santa Clara, CA Message from the Program Co-Chairs. . . . . . . . . . . . . . . . . . . . . . . .

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2017-07-14 07:19:47
25Cryptography / Cryptographic protocols / RC4 / Secure communication / Stream cipher / IEEE 802.11 / Transport Layer Security

All Your Biases Belong To Us: Breaking RC4 in WPA-TKIP and TLS Mathy Vanhoef and Frank Piessens, KU Leuven USENIX Security 2015 RC4

Add to Reading List

Source URL: www.rc4nomore.com

Language: English - Date: 2018-09-24 16:02:05
26Cryptocurrencies / Ethereum / Blockchains / Computing / Alternative currencies / Concurrent computing / Distributed computing / Cross-platform software / Bug bounty program / Smart contract / Software bug / Bounty

Enter the Hydra: Towards Principled Bug Bounties and Exploit-Resistant Smart Contracts Lorenz Breidenbach, Cornell Tech, IC3, ETH Zurich; Philip Daian, Cornell Tech, IC3; Florian Tramer, Stanford; Ari Juels, Cornell Tech

Add to Reading List

Source URL: www.usenix.org

Language: English
27Geographic data and information / Computing / Unix / OMB Circular A-16 / United States Office of Management and Budget / USENIX / cole Polytechnique Fdrale de Lausanne / Dependability / Information / Euthenics

Message from the NSDI ’16 Program Co-Chairs A warm welcome to NSDI ‘16! We are delighted to continue the NSDI tradition and share with you the latest and greatest research on network systems. This year’s program fe

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2017-07-14 07:19:47
28Computing / Information and communications technology / Internet architecture / Information Age / Firewall software / Internet censorship / Computer network security / Great Firewall / Content-control software / Localhost / Firewall / Router

Inferring Mechanics of Web Censorship Around the World John-Paul Verkamp Minaxi Gupta School of Informatics and Computing, Indiana University

Add to Reading List

Source URL: www.usenix.org

Language: English
29Higher education in China / Education in China / C9 League / Project 211 / Project 985 / Scott Shenker / Sylvia Ratnasamy / University of Science and Technology of China / Hari Balakrishnan / Microsoft Research / University of California /  Berkeley / Ion Stoica

NSDI ’18: 15th USENIX Symposium on Networked Systems Design and Implementation April 9–11, 2018 Renton, WA, USA New Hardware

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2018-03-08 20:36:19
30Computing / Internet / Internet protocols / Network architecture / Internet privacy / Internet security / Internet Standards / Network protocols / Hypertext Transfer Protocol / SOCKS / HTTP cookie / World Wide Web

Facade: High-Throughput, Deniable Censorship Circumvention Using Web Search Ben Jones Sam Burnett Nick Feamster Sean Donovan Sarthak Grover Sathya Gunasekaran Karim Habak

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2016-02-20 04:48:06
UPDATE