[go: up one dir, main page]

Scott, 2016 - Google Patents

Censorship Resistant Web Applications

Scott, 2016

View PDF
Document ID
13226186042861233318
Author
Scott W
Publication year

External Links

Snippet

Of the countless individuals around the world confronted by Internet censorship every day, only a small fraction are successful in reaching their destinations. This is a failing of the censorship circumvention community. The widespread nature of censorship reflects our …
Continue reading at digital.lib.washington.edu (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Khattak et al. A taxonomy of botnet behavior, detection, and defense
Dixon et al. Network traffic obfuscation and automated internet censorship
Nasr et al. MassBrowser: Unblocking the Censored Web for the Masses, by the Masses.
Dutta et al. Cyber security: issues and current trends
Rodday et al. The resource public key infrastructure (RPKI): A survey on measurements and future prospects
Houmansadr et al. Sweet: Serving the web by exploiting email tunnels
So et al. Domains do change their spots: Quantifying potential abuse of residual trust
Grothoff The gnunet system
Ten Oever et al. Research into human rights protocol considerations
Lee Framework for botnet emulation and analysis
Haraty et al. A collaborative-based approach for avoiding traffic analysis and assuring data integrity in anonymous systems
ten Oever et al. RFC 8280: Research into Human Rights Protocol Considerations
Elahi et al. Slipping past the cordon: A systematization of Internet censorship resistance
Scott Censorship Resistant Web Applications
Vilalonga et al. Looking at the Clouds: Leveraging Pub/Sub Cloud Services for Censorship-Resistant Rendezvous Channels
Ferronato Iot white worms: design and application
Wendzel et al. A Survey of Internet Censorship and its Measurement: Methodology, Trends, and Challenges
Khattak Characterization of Internet censorship from multiple perspectives
Daubert Anonymous Publish-Subscribe Overlays
Clark Toward the design of a Future Internet
Hagemeister Censorship-resistant Collaboration with a Hybrid DTN/P2P Network
Matic Active Techniques for Revealing and Analyzing the Security of Hidden Servers
Kamali Anonymous Communication within Highly Repressive Regions
Bi et al. Dissecting Open Edge Computing Platforms: Ecosystem, Usage, and Security Risks
Parra Rodriguez Computational Resource Abuse in Web Applications