Scott, 2016 - Google Patents
Censorship Resistant Web ApplicationsScott, 2016
View PDF- Document ID
- 13226186042861233318
- Author
- Scott W
- Publication year
External Links
Snippet
Of the countless individuals around the world confronted by Internet censorship every day, only a small fraction are successful in reaching their destinations. This is a failing of the censorship circumvention community. The widespread nature of censorship reflects our …
- 230000003203 everyday 0 abstract description 2
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Khattak et al. | A taxonomy of botnet behavior, detection, and defense | |
Dixon et al. | Network traffic obfuscation and automated internet censorship | |
Nasr et al. | MassBrowser: Unblocking the Censored Web for the Masses, by the Masses. | |
Dutta et al. | Cyber security: issues and current trends | |
Rodday et al. | The resource public key infrastructure (RPKI): A survey on measurements and future prospects | |
Houmansadr et al. | Sweet: Serving the web by exploiting email tunnels | |
So et al. | Domains do change their spots: Quantifying potential abuse of residual trust | |
Grothoff | The gnunet system | |
Ten Oever et al. | Research into human rights protocol considerations | |
Lee | Framework for botnet emulation and analysis | |
Haraty et al. | A collaborative-based approach for avoiding traffic analysis and assuring data integrity in anonymous systems | |
ten Oever et al. | RFC 8280: Research into Human Rights Protocol Considerations | |
Elahi et al. | Slipping past the cordon: A systematization of Internet censorship resistance | |
Scott | Censorship Resistant Web Applications | |
Vilalonga et al. | Looking at the Clouds: Leveraging Pub/Sub Cloud Services for Censorship-Resistant Rendezvous Channels | |
Ferronato | Iot white worms: design and application | |
Wendzel et al. | A Survey of Internet Censorship and its Measurement: Methodology, Trends, and Challenges | |
Khattak | Characterization of Internet censorship from multiple perspectives | |
Daubert | Anonymous Publish-Subscribe Overlays | |
Clark | Toward the design of a Future Internet | |
Hagemeister | Censorship-resistant Collaboration with a Hybrid DTN/P2P Network | |
Matic | Active Techniques for Revealing and Analyzing the Security of Hidden Servers | |
Kamali | Anonymous Communication within Highly Repressive Regions | |
Bi et al. | Dissecting Open Edge Computing Platforms: Ecosystem, Usage, and Security Risks | |
Parra Rodriguez | Computational Resource Abuse in Web Applications |