Date: 2014-05-19 10:30:48Computing Network architecture Internet Internet protocols Secure communication Internet Standards Cryptographic protocols Network protocols Transmission Control Protocol Proxy server Deep packet inspection Steganography | | StegoTorus: A Camouflage Proxy for the Tor Anonymity System Zachary Weinberg,1,2 Jeffrey Wang,3 Vinod Yegneswaran,2 Linda Briesemeister,2 Steven Cheung,2 Frank Wang,3 and Dan Boneh 3 1Add to Reading ListSource URL: censorbib.nymity.chDownload Document from Source Website File Size: 1,02 MBShare Document on Facebook
|