-
3
-
-
85076315135
-
-
Anonymizer. http://www.anonymizer.com/.
-
-
-
-
4
-
-
84947242344
-
Traffic analysis attacks and trade-offs in anonymity providing systems
-
I. S. Moskowitz, editor, Springer-Verlag, LNCS 2137, April
-
A. Back, U. Möller, and A. Stiglic. Traffic analysis attacks and trade-offs in anonymity providing systems. In I. S. Moskowitz, editor, Proceedings of Information Hiding Workshop (IH 2001), pages 245–257. Springer-Verlag, LNCS 2137, April 2001.
-
(2001)
Proceedings of Information Hiding Workshop (IH 2001)
, pp. 245-257
-
-
Back, A.1
Möller, U.2
Stiglic, A.3
-
5
-
-
38849140395
-
A web based covert file system
-
Berkeley, CA, USA, USENIX Association
-
A. Baliga, J. Kilian, and L. Iftode. A web based covert file system. In HOTOS’07: Proceedings of the 11th USENIX workshop on Hot topics in operating systems, pages 1–6, Berkeley, CA, USA, 2007. USENIX Association.
-
(2007)
HOTOS’07: Proceedings of the 11th USENIX Workshop on Hot Topics in Operating Systems
, pp. 1-6
-
-
Baliga, A.1
Kilian, J.2
Iftode, L.3
-
6
-
-
79959681025
-
Low-resource routing attacks against tor
-
Washington, DC, USA, Oct
-
K. Bauer, D. McCoy, D. Grunwald, T. Kohno, and D. Sicker. Low-resource routing attacks against tor. In Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2007), Washington, DC, USA, Oct. 2007.
-
(2007)
Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2007)
-
-
Bauer, K.1
McCoy, D.2
Grunwald, D.3
Kohno, T.4
Sicker, D.5
-
7
-
-
85076273234
-
A matter of cost
-
Can Google Beat China? Jan
-
S. M. Bellovin. A Matter of Cost. New York Times Room for Debate Blog. Can Google Beat China? http://roomfordebate.blogs.nytimes.com/2010/01/15/can-google-beat-china/#steven, Jan. 2010.
-
(2010)
New York Times Room for Debate Blog
-
-
Bellovin, S.M.1
-
8
-
-
0038684291
-
-
White paper, Zero Knowledge Systems, Inc., December
-
P. Boucher, A. Shostack, and I. Goldberg. Freedom systems 2.0 architecture. White paper, Zero Knowledge Systems, Inc., December 2000.
-
(2000)
Freedom Systems 2.0 Architecture
-
-
Boucher, P.1
Shostack, A.2
Goldberg, I.3
-
9
-
-
0032178374
-
A digital fountain approach to reliable distribution of bulk data
-
Vancouver, British Columbia, Canada, Sept
-
J. W. Byers, M. Luby, M. Mitzenmacher, and A. Rege. A digital fountain approach to reliable distribution of bulk data. In Proc. ACM SIGCOMM, pages 56–67, Vancouver, British Columbia, Canada, Sept. 1998.
-
(1998)
Proc. ACM SIGCOMM
, pp. 56-67
-
-
Byers, J.W.1
Luby, M.2
Mitzenmacher, M.3
Rege, A.4
-
13
-
-
85076289893
-
-
Collage. http://www.gtnoise.net/collage/.
-
-
-
-
14
-
-
85076268968
-
-
June
-
Could Iran Shut Down Twitter? http://futureoftheinternet.org/ could-iran-shut-down-twitter, June 2009.
-
(2009)
Could Iran Shut down Twitter?
-
-
-
16
-
-
50249171823
-
A survey of anonymous communication channels
-
Microsoft Research, January
-
G. Danezis and C. Diaz. A survey of anonymous communication channels. Technical Report MSR-TR-2008-35, Microsoft Research, January 2008.
-
(2008)
Technical Report MSR-TR-2008-35
-
-
Danezis, G.1
Diaz, C.2
-
18
-
-
85084161366
-
ToR: The second-generation onion router
-
San Diego, CA, Aug
-
R. Dingledine, N. Mathewson, and P. Syverson. Tor: The second-generation onion router. In Proc. 13th USENIX Security Symposium, San Diego, CA, Aug. 2004.
-
(2004)
Proc. 13th USENIX Security Symposium
-
-
Dingledine, R.1
Mathewson, N.2
Syverson, P.3
-
19
-
-
77952311184
-
-
China is number one. Jan
-
China is number one. The Economist, Jan. 2009. http://www.economist.com/daily/chartgallery/ displaystory.cfm?story_id=13007996.
-
(2009)
The Economist
-
-
-
20
-
-
85076269038
-
-
Facebook. http://www.facebook.com/.
-
-
-
-
21
-
-
85084161295
-
Infranet: Circumventing Web censorship and surveillance
-
San Francisco, CA, Aug
-
N. Feamster, M. Balazinska, G. Harfst, H. Balakrishnan, and D. Karger. Infranet: Circumventing Web censorship and surveillance. In Proc. 11th USENIX Security Symposium, San Francisco, CA, Aug. 2002.
-
(2002)
Proc. 11th USENIX Security Symposium
-
-
Feamster, N.1
Balazinska, M.2
Harfst, G.3
Balakrishnan, H.4
Karger, D.5
-
22
-
-
20444443764
-
Thwarting Web censorship with untrusted messenger discovery
-
Dresden, Germany, Mar
-
N. Feamster, M. Balazinska, W. Wang, H. Balakrishnan, and D. Karger. Thwarting Web censorship with untrusted messenger discovery. In 3rd Workshop on Privacy Enhancing Technologies, Dresden, Germany, Mar. 2003.
-
(2003)
3rd Workshop on Privacy Enhancing Technologies
-
-
Feamster, N.1
Balazinska, M.2
Wang, W.3
Balakrishnan, H.4
Karger, D.5
-
24
-
-
85076264397
-
-
Flickr. http://www.flickr.com/.
-
-
-
-
26
-
-
77955959845
-
-
Technical report, Freedom House, Mar
-
Freedom on the Net. Technical report, Freedom House, Mar. 2009. http://www.freedomhouse.org/uploads/specialreports/NetFreedom2009/ FreedomOnTheNet_FullReport.pdf.
-
(2009)
Freedom on the Net
-
-
-
29
-
-
6344251217
-
Fingerprinting websites using traffic analysis
-
San Francisco, CA, Apr
-
A. Hintz. Fingerprinting websites using traffic analysis. In Workshop on Privacy Enhancing Technologies, San Francisco, CA, Apr. 2002.
-
(2002)
Workshop on Privacy Enhancing Technologies
-
-
Hintz, A.1
-
30
-
-
0030704545
-
Consistent hashing and random trees: Distributed caching protocols for relieving hot spots on the world wide web
-
New York, NY, USA, ACM
-
D. Karger, E. Lehman, T. Leighton, R. Panigrahy, M. Levine, and D. Lewin. Consistent hashing and random trees: distributed caching protocols for relieving hot spots on the world wide web. In STOC’97: Proceedings of the twenty-ninth annual ACM symposium on Theory of computing, pages 654–663, New York, NY, USA, 1997. ACM.
-
(1997)
STOC’97: Proceedings of the Twenty-Ninth Annual ACM Symposium on Theory of Computing
, pp. 654-663
-
-
Karger, D.1
Lehman, E.2
Leighton, T.3
Panigrahy, R.4
Levine, M.5
Lewin, D.6
-
31
-
-
85076276307
-
-
June
-
South Korea mulls Web watch, June 2008. http://www.theinquirer.net/inquirer/news/091/1042091/southkorea-mulls-web-watch.
-
(2008)
South Korea Mulls Web Watch
-
-
-
32
-
-
19544363710
-
-
Technical Report TR2002-833, New York University, Nov
-
P. Maymounkov. Online codes. Technical Report TR2002-833, New York University, Nov. 2002.
-
(2002)
Online Codes
-
-
Maymounkov, P.1
-
34
-
-
84871993728
-
-
Cisco netflow. http://www.cisco.com/en/US/products/ps6601/products_ios_protocol_ group_home.html.
-
Cisco Netflow
-
-
-
36
-
-
85076273816
-
-
OpenNet Initiative. http://www.opennet.net/.
-
-
-
-
37
-
-
85076320023
-
Report on China’s filtering practices
-
Report on china’s filtering practices, 2008. Open Net Initiative. http://opennet.net/sites/opennet.net/files/china.pdf.
-
(2008)
Open Net Initiative
-
-
-
38
-
-
85076309730
-
-
Outguess. http://www.outguess.org/.
-
-
-
-
39
-
-
2642543760
-
Towards an information theoretic metric for anonymity
-
R. Dingledine and Syverson, editors, Springer-Verlag, LNCS 2482, April
-
A. Serjantov and G. Danezis. Towards an information theoretic metric for anonymity. In R. Dingledine and P. Syverson, editors, Proceedings of Privacy Enhancing Technologies Workshop (PET 2002). Springer-Verlag, LNCS 2482, April 2002.
-
(2002)
Proceedings of Privacy Enhancing Technologies Workshop (PET 2002)
-
-
Serjantov, A.1
Danezis, G.2
-
40
-
-
20444435333
-
Passive attack analysis for connection-based anonymity systems
-
Oct
-
A. Serjantov and P. Sewell. Passive attack analysis for connection-based anonymity systems. In Proceedings of ES-ORICS 2003, Oct. 2003.
-
(2003)
Proceedings of ES-ORICS 2003
-
-
Serjantov, A.1
Sewell, P.2
-
44
-
-
85076322054
-
-
Tor: Bridges. http://www.torproject.org/bridges.
-
Bridges
-
-
-
45
-
-
84891370729
-
-
Sept
-
Tor partially blocked in China, Sept. 2009. https://blog.torproject.org/blog/ tor- partially- blocked- china.
-
(2009)
Tor Partially Blocked in China
-
-
-
46
-
-
85076310385
-
-
May
-
TorrentFreak. China Hijacks Popular BitTorrent Sites. http://torrentfreak.com/china-hijacks-popular-bittorrent-sites-081108/, May 2008.
-
(2008)
China Hijacks Popular BitTorrent Sites
-
-
-
47
-
-
85076286214
-
-
Jan
-
Pakistan move knocked out YouTube, Jan. 2008. http://www.cnn.com/2008/WORLD/asiapcf/02/25/pakistan.youtube/index.html.
-
(2008)
Pakistan Move Knocked out YouTube
-
-
-
48
-
-
85076302123
-
-
Jan
-
Turkey blocks YouTube access, Jan. 2008. http://www.cnn.com/2008/WORLD/europe/03/13/ turkey.youtube.ap/index.html.
-
(2008)
Turkey Blocks YouTube Access
-
-
-
49
-
-
85076273986
-
-
Twitter. http://www.twitter.com.
-
-
-
-
51
-
-
85076287660
-
-
Ultimate List of Twitter Applications. http://techie-buzz.com/twitter/ ultimate-list-of-twitter-applications-and-websites. html, 2009.
-
(2009)
Ultimate List of Twitter Applications
-
-
-
54
-
-
85076292421
-
-
The Accidental Censor: UK ISP Blocks Wayback Machine, Jan. Ars Technica
-
The Accidental Censor: UK ISP Blocks Wayback Machine, Jan. 2009. Ars Technica. http://tinyurl.com/dk7mhl.
-
(2009)
-
-
-
55
-
-
85076313850
-
-
Dec
-
Wikipedia, Cleanfeed & Filtering, Dec. 2008. http://www.nartv.org/2008/12/08/ wikipedia- cleanfeed- filtering.
-
(2008)
Cleanfeed & Filtering
-
-
-
57
-
-
70450215339
-
-
Mar
-
YouTube Statistics. http://ksudigg.wetpaint.com/page/YouTube+Statistics, Mar. 2008.
-
(2008)
YouTube Statistics
-
-
|