51![Examining How the Great Firewall Discovers Hidden Circumvention Servers Roya Ensafi David Fifield Examining How the Great Firewall Discovers Hidden Circumvention Servers Roya Ensafi David Fifield](https://www.pdfsearch.io/img/ea210932b095ec0316a6afbd33464b38.jpg) | Add to Reading ListSource URL: nymity.chLanguage: English - Date: 2015-09-09 09:56:25
|
---|
52![Tor’s Usability for Censorship Circumvention David Fifield1 and Linda N. Lee1 , Serge Egelman1,2 , David Wagner1 1 University of California, Berkeley, {fifield,lnl,egelman,daw}@cs.berkeley.edu, 2 Tor’s Usability for Censorship Circumvention David Fifield1 and Linda N. Lee1 , Serge Egelman1,2 , David Wagner1 1 University of California, Berkeley, {fifield,lnl,egelman,daw}@cs.berkeley.edu, 2](https://www.pdfsearch.io/img/44ebed4c3821a21c12b4731b120dee38.jpg) | Add to Reading ListSource URL: www.eecs.berkeley.eduLanguage: English - Date: 2016-03-03 17:08:40
|
---|
53![H. ROne Hundred Fifth Congress of the United States of America AT T H E S E C O N D S E S S I O N H. ROne Hundred Fifth Congress of the United States of America AT T H E S E C O N D S E S S I O N](https://www.pdfsearch.io/img/97bd77c3ecad1ad2a43bbb4227374d87.jpg) | Add to Reading ListSource URL: www.gpo.govLanguage: English |
---|
54![Facet: Streaming over Videoconferencing for Censorship Circumvention Shuai Li Mike Schliep Nick Hopper Facet: Streaming over Videoconferencing for Censorship Circumvention Shuai Li Mike Schliep Nick Hopper](https://www.pdfsearch.io/img/0190d876755833d132a2afeb51062b9d.jpg) | Add to Reading ListSource URL: censorbib.nymity.chLanguage: English |
---|
55![Cover Your ACKs: Pitfalls of Covert Channel Censorship Circumvention John Geddes Max Schuchard Cover Your ACKs: Pitfalls of Covert Channel Censorship Circumvention John Geddes Max Schuchard](https://www.pdfsearch.io/img/dfb11e814d90f0c7ff514e0bd53db54b.jpg) | Add to Reading ListSource URL: www-users.cs.umn.eduLanguage: English - Date: 2013-09-04 16:00:20
|
---|
56![Facade: High-Throughput, Deniable Censorship Circumvention Using Web Search Ben Jones Sam Burnett Nick Feamster Sean Donovan Sarthak Grover Sathya Gunasekaran Karim Habak Facade: High-Throughput, Deniable Censorship Circumvention Using Web Search Ben Jones Sam Burnett Nick Feamster Sean Donovan Sarthak Grover Sathya Gunasekaran Karim Habak](https://www.pdfsearch.io/img/d5eb10e2a417f5ddf1fbde077eb7cd31.jpg) | Add to Reading ListSource URL: www.usenix.orgLanguage: English |
---|
57![rBridge: User Reputation based Tor Bridge Distribution with Privacy Preservation Qiyan Wang Department of Computer Science University of Illinois at Urbana-Champaign rBridge: User Reputation based Tor Bridge Distribution with Privacy Preservation Qiyan Wang Department of Computer Science University of Illinois at Urbana-Champaign](https://www.pdfsearch.io/img/8e477531a3d8aecbf98fef5004352092.jpg) | Add to Reading ListSource URL: www-users.cs.umn.eduLanguage: English - Date: 2012-12-18 10:55:02
|
---|
58![Facade: High-Throughput, Deniable Censorship Circumvention Using Web Search Ben Jones Sam Burnett Nick Feamster Sean Donovan Sarthak Grover Sathya Gunasekaran Karim Habak Facade: High-Throughput, Deniable Censorship Circumvention Using Web Search Ben Jones Sam Burnett Nick Feamster Sean Donovan Sarthak Grover Sathya Gunasekaran Karim Habak](https://www.pdfsearch.io/img/98c2749ddfc0d34390ab4e4963bd2e58.jpg) | Add to Reading ListSource URL: censorbib.nymity.chLanguage: English |
---|
59![Censorship Resistance as a Side-Effect Henry Tan Georgetown University Washington, DC USA Micah Sherr Censorship Resistance as a Side-Effect Henry Tan Georgetown University Washington, DC USA Micah Sherr](https://www.pdfsearch.io/img/19d9a34ad9093e62c0bdf638beaabafe.jpg) | Add to Reading ListSource URL: security.cs.georgetown.eduLanguage: English - Date: 2014-03-31 17:22:53
|
---|
60![](https://www.pdfsearch.io/img/a94b351a4d2fee88b2a6caef3506c03f.jpg) | Add to Reading ListSource URL: www.icir.orgLanguage: English - Date: 2015-05-16 21:58:42
|
---|