Internet censorship

Results: 1665



#Item
131Computer network security / Computer security / Cybercrime / National security / CyberPatriot / Internet censorship / Capture the flag / AP Computer Science / Security hacker / Science Bowl / Video game

PicoCTF: A Game-Based Computer Security Competition for High School Students Peter Chapman Carnegie Mellon University

Add to Reading List

Source URL: jburket.com

Language: English - Date: 2015-04-08 00:10:41
132Content-control software / Virtual communities / Internet privacy / Social networking services / Internet censorship circumvention / Internet security / Facebook / Reddit / Internet censorship / Internet Relay Chat

rBridge: User Reputation based Tor Bridge Distribution with Privacy Preservation Qiyan Wang Department of Computer Science University of Illinois at Urbana-Champaign

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2012-12-18 10:55:02
133

 Pornography Regulation and the Internet Rating System CHOU, Nien-Ying Traditional obscenity law tried to censorship sexual morality. The Libertarians attacked the governmental regulation arguing the priority of Indiv

Add to Reading List

Source URL: www.globalgender.org

- Date: 2015-02-05 22:09:30
    134

    A Look at the Consequences of Internet Censorship Through an ISP Lens Sheharbano Khattak1 , Mobin Javed2 , Syed Ali Khayam3 , Zartash Afzal Uzmi4 , Vern Paxson2,5 1 University of Cambridge, 2 UC Berkeley, 3 PLUMgrid, 4

    Add to Reading List

    Source URL: censorbib.nymity.ch

    Language: English
      135Internet protocols / Internet security / Internet Standards / Secure communication / World Wide Web / Transport Layer Security / Internet censorship circumvention / SPDY / Telex / Public-key cryptography / Censorship / Tor

      Censorship Resistance as a Side-Effect Henry Tan Georgetown University Washington, DC USA Micah Sherr

      Add to Reading List

      Source URL: security.cs.georgetown.edu

      Language: English - Date: 2014-03-31 17:22:53
      136

      Research Statement Eric Wustrow My research focuses on computer security from a systems perspective. My graduate work has spanned censorship resistance, Internet protocol security, and embedded systems security, includi

      Add to Reading List

      Source URL: ericw.us

      Language: English - Date: 2015-01-17 16:08:58
        137Internet protocols / Internet privacy / Secure communication / Internet security / Transport Layer Security / Proxy server / Internet censorship circumvention / Server Name Indication / Hypertext Transfer Protocol / HTTPS / Flash proxy / WebSocket

        PDF Document

        Add to Reading List

        Source URL: www.icir.org

        Language: English - Date: 2015-05-16 21:58:42
        138Internet censorship in the United States

        PDF Document

        Add to Reading List

        Source URL: www.lc.org

        Language: English - Date: 2016-02-27 04:23:44
          139

          A Look at the Consequences of Internet Censorship Through an ISP Lens Sheharbano Khattak1 , Mobin Javed2 , Syed Ali Khayam3 , Zartash Afzal Uzmi4 , Vern Paxson2,5 1 University of Cambridge, 2 UC Berkeley, 3 PLUMgrid, 4

          Add to Reading List

          Source URL: conferences2.sigcomm.org

          Language: English - Date: 2014-11-04 06:52:11
            140

            ConceptDoppler: A Weather Tracker for Internet Censorship Jedidiah R. Crandall Daniel Zinn

            Add to Reading List

            Source URL: earlbarr.com

            Language: English - Date: 2011-12-24 15:52:38
              UPDATE