-
5
-
-
85084161295
-
Infranet: Circumventing Web Censorship and Surveillance
-
N. Feamster, M. Balazinska, G. Harfst, H. Balakrishnan, and D. Karger, “Infranet: Circumventing Web Censorship and Surveillance, ” in 11th USENIX Security Symposium, 2002, pp. 247-262.
-
(2002)
11th USENIX Security Symposium
, pp. 247-262
-
-
Feamster, N.1
Balazinska, M.2
Harfst, G.3
Balakrishnan, H.4
Karger, D.5
-
6
-
-
85180400734
-
-
“DynaWeb, ” http://www.dongtaiwang.com/home_en.php.
-
DynaWeb
-
-
-
7
-
-
84893208617
-
Chipping Away at Censorship Firewalls with User-Generated Content
-
S. Burnett, N. Feamster, and S. Vempala, “Chipping Away at Censorship Firewalls with User-Generated Content, ” in USENIX Security Symposium, 2010, pp. 463-468.
-
(2010)
USENIX Security Symposium
, pp. 463-468
-
-
Burnett, S.1
Feamster, N.2
Vempala, S.3
-
9
-
-
33645586953
-
The Anonymizer: Protecting User Privacy on the Web
-
Sep
-
J. Boyan, “The Anonymizer: Protecting User Privacy on the Web, ” Computer-Mediated Communication Magazine, vol. 4, no. 9, Sep. 1997.
-
(1997)
Computer-Mediated Communication Magazine
, vol.4
, Issue.9
-
-
Boyan, J.1
-
10
-
-
85075948939
-
Telex: Anticensorship in the Network Infrastructure
-
E. Wustrow, S. Wolchok, I. Goldberg, and J. A. Halderman, “Telex: Anticensorship in the Network Infrastructure, ” in 20th Usenix Security Symposium, 2011.
-
(2011)
20th Usenix Security Symposium
-
-
Wustrow, E.1
Wolchok, S.2
Goldberg, I.3
Halderman, J. A.4
-
11
-
-
80755169503
-
Cirripede: Circumvention Infrastructure using Router Redirection with Plausible Deniability Categories and Subject Descriptors
-
A. Houmansadr, G. T. K. Nguyen, M. Caesar, and N. Borisov, “Cirripede: Circumvention Infrastructure using Router Redirection with Plausible Deniability Categories and Subject Descriptors, ” in ACM Conference on Computer and Communications Security, 2011.
-
(2011)
ACM Conference on Computer and Communications Security
-
-
Houmansadr, A.1
Nguyen, G. T. K.2
Caesar, M.3
Borisov, N.4
-
12
-
-
84864272869
-
-
Tech. Rep. Arxiv preprint, arXiv:1204.0447
-
P. Winter and S. Lindskog, “How China Is Blocking Tor, ” http://arxiv.org/abs/1204.0447, Tech. Rep. Arxiv preprint, arXiv:1204.0447, 2012.
-
(2012)
How China Is Blocking Tor
-
-
Winter, P.1
Lindskog, S.2
-
14
-
-
80755188472
-
-
Sep
-
“Tor partially blocked in China, ” https://blog.torproject.org/blog/tor-partially-blocked-china, Sep. 2007.
-
(2007)
Tor partially blocked in China
-
-
-
18
-
-
20444443764
-
Thwarting Web Censorship with Untrusted Messenger Discovery
-
N. Feamster, M. Balazinska, W. Wang, H. Balakrishnan, and D. Karger, “Thwarting Web Censorship with Untrusted Messenger Discovery, ” in the 3rd International Workshop on Privacy Enhancing Technologies, 2003.
-
(2003)
the 3rd International Workshop on Privacy Enhancing Technologies
-
-
Feamster, N.1
Balazinska, M.2
Wang, W.3
Balakrishnan, H.4
Karger, D.5
-
19
-
-
79956313758
-
Fighting Censorship with Algorithms
-
P. Boldi and L. Gargano, Eds. Springer
-
M. Mahdian, “Fighting Censorship with Algorithms, ” in Fun with Algorithms, ser. Lecture Notes in Computer Science, P. Boldi and L. Gargano, Eds. Springer, 2010, vol. 6099, pp. 296-306.
-
(2010)
Fun with Algorithms, ser. Lecture Notes in Computer Science
, vol.6099
, pp. 296-306
-
-
Mahdian, M.1
-
21
-
-
85180414780
-
-
“Ultrasurf, ” http://www.ultrareach.com.
-
Ultrasurf
-
-
-
22
-
-
85180415971
-
-
“Psiphon, ” http://psiphon.ca/.
-
Psiphon
-
-
-
27
-
-
84869462325
-
StegoTorus: A Camouflage Proxy for the Tor Anonymity System
-
Z. Weinberg, J. Wang, V. Yegneswaran, L. Briesemeister, S. Cheung, F. Wang, and D. Boneh, “StegoTorus: A Camouflage Proxy for the Tor Anonymity System, ” in ACM Conference on Computer and Communications Security (CCS), 2012.
-
(2012)
ACM Conference on Computer and Communications Security (CCS)
-
-
Weinberg, Z.1
Wang, J.2
Yegneswaran, V.3
Briesemeister, L.4
Cheung, S.5
Wang, F.6
Boneh, D.7
-
28
-
-
84869390728
-
SkypeMorph: Protocol Obfuscation for Tor Bridges
-
H. M. Moghaddam, B. Li, M. Derakhshani, and I. Goldberg, “SkypeMorph: Protocol Obfuscation for Tor Bridges, ” in ACM Conference on Computer and Communications Security, 2012.
-
(2012)
ACM Conference on Computer and Communications Security
-
-
Moghaddam, H. M.1
Li, B.2
Derakhshani, M.3
Goldberg, I.4
-
30
-
-
84870628783
-
-
“Ten ways to discover Tor bridges, ” https://blog.torproject.org/blog/research-problems-ten-ways-discover-tor-bridges.
-
Ten ways to discover Tor bridges
-
-
-
31
-
-
84869448200
-
CensorSpoofer: Asymmetric Communication with IP Spoofing for Censorship-ResistantWeb Browsing
-
Q. Wang, X. Gong, G. T. K. Nguyen, A. Houmansadr, and N. Borisov, “CensorSpoofer: Asymmetric Communication with IP Spoofing for Censorship-ResistantWeb Browsing, ” in ACM Conference on Computer and Communications Security, 2012.
-
(2012)
ACM Conference on Computer and Communications Security
-
-
Wang, Q.1
Gong, X.2
Nguyen, G. T. K.3
Houmansadr, A.4
Borisov, N.5
-
32
-
-
84869416653
-
Routing Around Decoys
-
M. Schuchard, J. Geddes, C. Thompson, and N. Hopper, “Routing Around Decoys, ” in ACM Conference on Computer and Communications Security (CCS), 2012.
-
(2012)
ACM Conference on Computer and Communications Security (CCS)
-
-
Schuchard, M.1
Geddes, J.2
Thompson, C.3
Hopper, N.4
-
36
-
-
85180417014
-
-
“VoIP growing statistics, ” http://www.sipnology.com/company/20-voip-growing-statistics.
-
VoIP growing statistics
-
-
-
38
-
-
85180414517
-
-
“The Importance of VoIP, ” http://ezinearticles.com/?The-Importance-of-VoIP&id=4278231.
-
The Importance of VoIP
-
-
-
39
-
-
85032752403
-
Turbo Equalization
-
R. Koetter, A. C. Singer, and M. Tchler, “Turbo Equalization, ” IEEE Signal Processing Mag, vol. 21, pp. 67-80, 2004.
-
(2004)
IEEE Signal Processing Mag
, vol.21
, pp. 67-80
-
-
Koetter, R.1
Singer, A. C.2
Tchler, M.3
-
40
-
-
0036353318
-
Bit Interleaved Coded Modulation Using Multiple Turbo Codes
-
A. Banerjee, D. J. Costello, Jr., T. E. Fuja, and P. C. Massey, “Bit Interleaved Coded Modulation Using Multiple Turbo Codes, ” in IEEE International Symposium on Information Theory, 2002, p. 443.
-
(2002)
IEEE International Symposium on Information Theory
, pp. 443
-
-
Banerjee, A.1
Costello, D. J.2
Fuja, T. E.3
Massey, P. C.4
-
42
-
-
0003415244
-
Hypertext Transfer Protocol - HTTP/1.1
-
Jun
-
R. Fielding, J. Gettys, J. Mogul, H. Frystyk, L. Masinter, P. Leach, and T. Berners-Lee, “Hypertext Transfer Protocol - HTTP/1.1, ” RFC 2616, Jun. 1999.
-
(1999)
RFC 2616
-
-
Fielding, R.1
Gettys, J.2
Mogul, J.3
Frystyk, H.4
Masinter, L.5
Leach, P.6
Berners-Lee, T.7
-
43
-
-
0004001569
-
-
Apr
-
M. Leech, M. Ganis, Y. Lee, R. Kuris, D. Koblas, and L. Jones, “RFC 1928: SOCKS Protocol Version 5, ” Apr. 1996.
-
(1996)
RFC 1928: SOCKS Protocol Version 5
-
-
Leech, M.1
Ganis, M.2
Lee, Y.3
Kuris, R.4
Koblas, D.5
Jones, L.6
-
46
-
-
0037984544
-
-
Jun
-
J. Rosenberg, H. Schulzrinne, G. Camarillo, A. Johanston, J. Peterson, R. Sparks, M. Handley, and E. Schooler, “RFC 3261: SIP Session Initiation Protocol, ” Jun. 2002.
-
(2002)
RFC 3261: SIP Session Initiation Protocol
-
-
Rosenberg, J.1
Schulzrinne, H.2
Camarillo, G.3
Johanston, A.4
Peterson, J.5
Sparks, R.6
Handley, M.7
Schooler, E.8
-
47
-
-
0242627054
-
RTP: A Transport Protocol for Real-Time Applications
-
Jul
-
H. Schulzrinne, S. L. Casner, R. Frederick, and V. Jacobson, “RTP: A Transport Protocol for Real-Time Applications, ” Internet RFC 3550, Jul. 2003.
-
(2003)
Internet RFC 3550
-
-
Schulzrinne, H.1
Casner, S. L.2
Frederick, R.3
Jacobson, V.4
-
48
-
-
26844503631
-
The Secure Real-time Transport Protocol (SRTP)
-
Mar
-
M. Baugher, E. Carrara, D. A. McGrew, M. Naslund, and K. Norrman, “The Secure Real-time Transport Protocol (SRTP), ” Internet RFC 3711, Mar. 2004.
-
(2004)
Internet RFC 3711
-
-
Baugher, M.1
Carrara, E.2
McGrew, D. A.3
Naslund, M.4
Norrman, K.5
-
49
-
-
84876250471
-
Requirements from Session Initiation Protocol (SIP) Session Border Control (SBC) Deployments
-
Apr
-
J. Hautakorpi, G. Camarillo, R. Penfield, A. Hawrylyshen, and M. Bhatia, “Requirements from Session Initiation Protocol (SIP) Session Border Control (SBC) Deployments, ” Internet RFC 5853, Apr. 2010.
-
(2010)
Internet RFC 5853
-
-
Hautakorpi, J.1
Camarillo, G.2
Penfield, R.3
Hawrylyshen, A.4
Bhatia, M.5
-
51
-
-
85084162299
-
Decoy Routing: Toward Unblockable Internet Communication
-
J. Karlin, D. Ellard, A. W. Jackson, C. E. Jones, G. Lauer, D. P. Mankins, and W. T. Strayer, “Decoy Routing: Toward Unblockable Internet Communication, ” in 1st USENIX Workshop on Free and Open Communications on the Internet (FOCI), 2011.
-
(2011)
1st USENIX Workshop on Free and Open Communications on the Internet (FOCI)
-
-
Karlin, J.1
Ellard, D.2
Jackson, A. W.3
Jones, C. E.4
Lauer, G.5
Mankins, D. P.6
Strayer, W. T.7
-
52
-
-
0029720059
-
Diffie-Hellman Key Distribution Extended to Groups
-
ACM, Mar
-
M. Steiner, G. Tsudik, and M. Waidner, “Diffie-Hellman Key Distribution Extended to Groups, ” in the 3rd ACM Conference on Computer and Communications Security. ACM, Mar. 1996, pp. 31-37.
-
(1996)
the 3rd ACM Conference on Computer and Communications Security
, pp. 31-37
-
-
Steiner, M.1
Tsudik, G.2
Waidner, M.3
-
53
-
-
46749140803
-
-
“VoIP codecs, ” http://www.en.voipforo.com/codec/codecs. php.
-
VoIP codecs
-
-
-
54
-
-
84862120239
-
-
“Google talk call signaling, ” https://developers.google.com/talk/call_signaling#Supported_Media_Types.
-
Google talk call signaling
-
-
-
55
-
-
80055065595
-
SILK speech codec
-
Working Draft, IETF Secretariat, Fremont, CA, USA, Tech. Rep. draft-vos-silk-02.txt, Sep
-
S. Jensen, K. Vos, and K. Soerensen, “SILK speech codec, ” Working Draft, IETF Secretariat, Fremont, CA, USA, Tech. Rep. draft-vos-silk-02.txt, Sep. 2010.
-
(2010)
-
-
Jensen, S.1
Vos, K.2
Soerensen, K.3
-
57
-
-
84881243940
-
-
“Tor BridgeDB, ” https://gitweb.torproject.org/bridgedb.git/tree.
-
Tor BridgeDB
-
-
-
59
-
-
0036184272
-
Protecting Free Expression Online with Freenet
-
I. Clarke, T. W. Hong, S. G. Miller, O. Sandberg, and B. Wiley, “Protecting Free Expression Online with Freenet, ” IEEE Internet Computing, vol. 6, no. 1, pp. 40-49, 2002.
-
(2002)
IEEE Internet Computing
, vol.6
, Issue.1
, pp. 40-49
-
-
Clarke, I.1
Hong, T. W.2
Miller, S. G.3
Sandberg, O.4
Wiley, B.5
-
60
-
-
84881247396
-
Evading Censorship with Browser-Based Proxies
-
D. Fifield, N. Hardison, J. Ellithrope, E. Stark, R. Dingledine, D. Boneh, and P. Porras, “Evading Censorship with Browser-Based Proxies, ” in Privacy Enhancing Technologies Symposium (PETS), 2012.
-
(2012)
Privacy Enhancing Technologies Symposium (PETS)
-
-
Fifield, D.1
Hardison, N.2
Ellithrope, J.3
Stark, E.4
Dingledine, R.5
Boneh, D.6
Porras, P.7
-
62
-
-
84869460244
-
-
Arxiv preprint, arXiv:1111.1250, Tech. Rep
-
W. Mazurczyk, P. Szaga, and K. Szczypiorski, “Using Transcoding for Hidden Communication in IP Telephony, ” Arxiv preprint, arXiv:1111.1250, Tech. Rep., 2011.
-
(2011)
Using Transcoding for Hidden Communication in IP Telephony
-
-
Mazurczyk, W.1
Szaga, P.2
Szczypiorski, K.3
-
63
-
-
80051967189
-
Phonotactic reconstruction of encrypted VoIP conversations: Hookt on fon-iks
-
A. White, A. Matthews, K. Snow, and F. Monrose, “Phonotactic reconstruction of encrypted VoIP conversations: Hookt on fon-iks, ” in IEEE Symposium on Security and Privacy, 2011, pp. 3-18.
-
(2011)
IEEE Symposium on Security and Privacy
, pp. 3-18
-
-
White, A.1
Matthews, A.2
Snow, K.3
Monrose, F.4
-
64
-
-
85084163803
-
Three Researchers, Five Conjectures: An Empirical Analysis of TOM-Skype Censorship and Surveillance
-
J. Knockel, J. R. Crandall, and J. Saia, “Three Researchers, Five Conjectures: An Empirical Analysis of TOM-Skype Censorship and Surveillance, ” in the 1st USENIX Workshop on Free and Open Communications on the Internet, 2011.
-
(2011)
the 1st USENIX Workshop on Free and Open Communications on the Internet
-
-
Knockel, J.1
Crandall, J. R.2
Saia, J.3
-
66
-
-
85180416951
-
Surveillance of Skype messages found in China
-
“Surveillance of Skype messages found in China, ” International Herald Tribune, Tech. Rep., 2008.
-
(2008)
International Herald Tribune, Tech. Rep
-
-
-
68
-
-
85180417160
-
-
Mar
-
“Skype says texts are censored by China, ” http://www.ft.com/cms/s/2/875630d4-cef9-11da-925d-0000779e2340. html#axzz1tpnzbzkm, Mar. 2009.
-
(2009)
Skype says texts are censored by China
-
-
|