Back to Results
First PageMeta Content
Internet / Internet privacy / Computer network security / SOCKS / Skype protocol / Internet standards / Transmission Control Protocol / Password authentication protocol / Deep packet inspection / Computing / Internet protocols / Network architecture


arXiv:submit[removed]cs.CR] 14 May[removed]ScrambleSuit: A Polymorph Network Protocol to Circumvent Censorship Philipp Winter
Add to Reading List

Document Date: 2014-05-26 09:37:41


Open Document

File Size: 616,91 KB

Share Result on Facebook

City

Lincoln / /

Company

BitTorrent / Skype / AES / Dismantling Intrusion Prevention Systems / Secure Networks Inc. / /

Country

Egypt / China / Ethiopia / Iran / Russia / Syria / /

Event

FDA Phase / /

Facility

Tor bridge / /

IndustryTerm

Internet access / moderate protocol / web users / transportation / opaque Internet traffic / resistant protocols / obfuscated protocols / transport protocol / Internet censorship / application layer protocol / circumvention tools / circumvention tool / Web Spying / censorship systems / block protocols / request-response protocol / unblockable network protocols / telephone line / social networks / web server / unwanted network protocols / application layer protocols / corporate networks / respective cover protocols / censorship-resistant protocol / comfortable web surfing / packet inspection technology / it harder to identify obfuscated protocols / low-latency applications / transported application layer protocol / rendezvous protocol / cover protocols / arbitrary application protocols / low-latency anonymity network / transport protocols / cover protocol / web surfing / well-defined protocols / Internet Surveillance Starts / application protocols / /

MusicGroup

Á. Finally / /

OperatingSystem

Unix / Debian GNU/Linux / Linux / /

Organization

IMC / Circumvent Censorship Philipp Winter Tobias Pulls Juergen Fuss Karlstad University Karlstad University Upper Austria University of Applied Sciences ABSTRACT Deep / USENIX Association / Swedish Internet Infrastructure Foundation / Internet Society / /

Person

Andreas Haeberlen / Stefan Lindskog / Steven J. Murdoch / George Kadianakis / Christopher Rhoads / Thomas H. Ptacek / Timothy N. Newsham / Mark Handley / Figure / Alan Mislove / Vern Paxson / Robert N. M. Watson / Marcel Dischinger / Michael Rogers / Richard Clayton / Andrew M. White / Krishna P. Gummadi / Christian Kreibich / Loretta Chao / Harald Lampesberger / Philipp Winter Tobias Pulls Juergen / Jillian C. York / /

Position

same entry guard / author / forward / /

Product

Packet Injection / UniformDH / HMAC-SHA256-128 / HMACSHA256-128 / /

ProgrammingLanguage

Python / /

Technology

application layer protocols / 2.1 RELATED WORK Protocol / moderate protocol / Linux / Dust protocol / low protocol / resistant protocols / instant messaging / Confidentiality Our protocol / secret key / operating system / cover protocol / existing protocol / maximum transmission unit / application layer protocol / respective cover protocols / encryption / Applied Sciences ABSTRACT Deep packet inspection technology / flow control / arbitrary application protocols / censorship-resistant protocol / Blocking-resistant protocols / cover protocols / DPI technology / unblockable network protocols / unwanted network protocols / specialised algorithm / blocking-resistant protocol / flash / alpha / LAN / request-response protocol / Fast Ethernet / well-defined protocols / Unix / VPN / private key / application protocol / Tor protocol / SSL / pdf / blocking-resistant transport protocols / Ethernet / application protocols / network protocol / SOCKS protocol / transported application layer protocol / block protocols / public key / DNS / Firewall / rendezvous protocol / transport protocol / blocking-resistant transport protocol / HTTP / 2.2 Protocol / caching / supposedly obfuscated protocols / message stream encryption / web server / stream cipher / network protocols / /

URL

www.kernel.org/pub/linux/kernel/v1.0/linux-1.0.tar / http /

SocialTag