<--- Back to Details
First PageDocument Content
Computing / Software / Computer architecture / Skype / Videotelephony / Cryptographic protocols / Internet protocols / Skype protocol / Deep packet inspection / Voice over IP / BitTorrent protocol encryption / Transmission Control Protocol
Date: 2018-08-13 15:14:33
Computing
Software
Computer architecture
Skype
Videotelephony
Cryptographic protocols
Internet protocols
Skype protocol
Deep packet inspection
Voice over IP
BitTorrent protocol encryption
Transmission Control Protocol

SkypeMorph: Protocol Obfuscation for Tor Bridges∗ Hooman Mohajeri Moghaddam Baiyu Li Mohammad Derakhshani Ian Goldberg Cheriton School of Computer Science

Add to Reading List

Source URL: crysp.uwaterloo.ca

Download Document from Source Website

File Size: 812,68 KB

Share Document on Facebook

Similar Documents

Two Methods for Detecting Malware Maciej Korczyński, Gilles Berger-Sabbatel, and Andrzej Duda Grenoble Institute of Technology, CNRS Grenoble Informatics Laboratory UMR, rue de la Passerelle, BPSaint

Two Methods for Detecting Malware Maciej Korczyński, Gilles Berger-Sabbatel, and Andrzej Duda Grenoble Institute of Technology, CNRS Grenoble Informatics Laboratory UMR, rue de la Passerelle, BPSaint

DocID: 1pV4d - View Document

®  Luxriot VMS Software Luxriot is an open architecture Video Management System (VMS). Luxriot accepts MJPEG, MPEG4 and H.264 as well as HD and megapixel video streams

® Luxriot VMS Software Luxriot is an open architecture Video Management System (VMS). Luxriot accepts MJPEG, MPEG4 and H.264 as well as HD and megapixel video streams

DocID: 1pQmR - View Document

Application Note Lync 2010 deployment guide Document version: v1.2 Last update:

Application Note Lync 2010 deployment guide Document version: v1.2 Last update:

DocID: 1oLAa - View Document

CALEA	
  II:	
  Risks	
  of	
  Wiretap	
  Modifications	
  to	
  Endpoints	
   Ben	
  Adida	
   Collin	
  Anderson	
   Annie	
  I.	
  Anton	
  (Georgia	
  Institute	
  of	
  Technology)	
   Matt	
  Bl

CALEA  II:  Risks  of  Wiretap  Modifications  to  Endpoints   Ben  Adida   Collin  Anderson   Annie  I.  Anton  (Georgia  Institute  of  Technology)   Matt  Bl

DocID: 1oodh - View Document

An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol Salman A. Baset and Henning G. Schulzrinne Department of Computer Science Columbia University, New York NY 10027 {salman,hgs}@cs.columbia.edu

An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol Salman A. Baset and Henning G. Schulzrinne Department of Computer Science Columbia University, New York NY 10027 {salman,hgs}@cs.columbia.edu

DocID: 1g48V - View Document