![Computing / Software / Computer architecture / Skype / Videotelephony / Cryptographic protocols / Internet protocols / Skype protocol / Deep packet inspection / Voice over IP / BitTorrent protocol encryption / Transmission Control Protocol Computing / Software / Computer architecture / Skype / Videotelephony / Cryptographic protocols / Internet protocols / Skype protocol / Deep packet inspection / Voice over IP / BitTorrent protocol encryption / Transmission Control Protocol](https://www.pdfsearch.io/img/dc7719353510cfef3b16df5e96407494.jpg) Date: 2018-08-13 15:14:33Computing Software Computer architecture Skype Videotelephony Cryptographic protocols Internet protocols Skype protocol Deep packet inspection Voice over IP BitTorrent protocol encryption Transmission Control Protocol | | SkypeMorph: Protocol Obfuscation for Tor Bridges∗ Hooman Mohajeri Moghaddam Baiyu Li Mohammad Derakhshani Ian Goldberg Cheriton School of Computer ScienceAdd to Reading ListSource URL: crysp.uwaterloo.caDownload Document from Source Website File Size: 812,68 KBShare Document on Facebook
|