Back to Results
First PageMeta Content
Network architecture / Freenet / Presence information / Computer architecture / Software / Computing / Infranet


Infranet: Circumventing Web Censorship and Surveillance Nick Feamster, Magdalena Balazinska, Greg Harfst, Hari Balakrishnan, David Karger MIT Laboratory for Computer Science feamster, mbalazin, gch, hari, karger  @lcs.m
Add to Reading List

Document Date: 2004-10-06 14:55:09


Open Document

File Size: 390,13 KB

Share Result on Facebook

Company

Voice of America / Yahoo / /

Country

Germany / Saudi Arabia / France / United States / Australia / China / /

/

Event

Business Partnership / Diplomatic Relations / /

Facility

Tunnel Protocol The Infranet tunnel / Tunnel Setup / /

IndustryTerm

Internet access / innocuous Web transactions / innocent Web clients / Web Server Figure / origin server / good tunnel protocol / requester software / Web content / innocuous Web / normal Web users / Web proxy / Internet content / Web Browser / innocuous Web browsing / anonymous Web sessions / client-side Web / Web Censorship / Web user / covert tunnel protocol / Web communication / appropriate origin Web server / Web site fingerprinting / Internet censorship / range-mapping algorithm / Web client / Web surfing habits / Web requests / Internet traffic / Web servers / particular site / Web traffic / regular Web browsing / Web transactions / tunnel protocol / Web clients / typical Web sites / Web server software / communication protocols / covert Web browsing / Web server / Internet users / public Web server / software entity / typical Web images / similar product / /

Organization

MIT / U.S. Supreme Court / /

Person

Origin Web / Magdalena Balazinska / Greg Harfst / /

Position

model / each page has à links / Private / /

Product

Infranet / /

ProgrammingLanguage

HTML / /

Technology

tunnel protocol / JPEG / peer-to-peer / good tunnel protocol / private key / data hiding / secret key / HTML / SSL / Infranet tunnel protocol / public key / finite state machine / HTTP / caching / communication protocols / range-mapping algorithm / Adler-Maggs protocol / covert tunnel protocol / /

URL

http /

SocialTag