Roya

Results: 150



#Item
51

Running Software in Albuquerque to Measure Censorship Anywhere Jeffrey Knockel Roya Ensafi Jedidiah Crandall Computer Science Department

Add to Reading List

Source URL: cs.unm.edu

- Date: 2013-07-26 15:11:19
    52

    Studying the Great Firewall of China: From Internet Filtering to Actively Probing Anti-Censorship Tools Roya Ensafi April 28, 2016

    Add to Reading List

    Source URL: netseminar.stanford.edu

    Language: English - Date: 2016-06-09 14:53:40
      53

      Meetings & ev ents royal sAvoy lausanne — lac leman hotel roya l s avoy

      Add to Reading List

      Source URL: en.buergenstock-selection.ch

      Language: English - Date: 2012-04-24 06:57:54
        54Computing / Internet / Network architecture / Secure communication / Internet Standards / Internet security / Computer network security / Internet protocols / SoftEther VPN / Tor / HTTPS / Transport Layer Security

        Examining How the Great Firewall Discovers Hidden Circumvention Servers Roya Ensafi David Fifield

        Add to Reading List

        Source URL: conferences.sigcomm.org

        Language: English - Date: 2015-09-25 08:38:52
        55

        Programa Nacional de Vigilancia de la Roya de la Soja El referente zonal recepcionará las muestras para diagnosticar la enfermedad en base a sintomatología y si es necesario verificará a campo los síntomas sospechos

        Add to Reading List

        Source URL: www.chasque.net

        Language: Spanish - Date: 2004-12-15 07:37:39
          56Computing / Internet / Network architecture / Secure communication / Internet Standards / Computer network security / Internet protocols / Internet security / SoftEther VPN / Tor / Transport Layer Security / HTTPS

          Examining How the Great Firewall Discovers Hidden Circumvention Servers Roya Ensafi David Fifield

          Add to Reading List

          Source URL: www.icir.org

          Language: English - Date: 2015-10-05 18:07:52
          57

          Ethical Concerns for Censorship Measurement Ben Jones, Roya Ensafi, Nick Feamster, Vern Paxson, Nick Weaver Princeton University, UC Berkeley, International Computer Science Institute Abstract

          Add to Reading List

          Source URL: ensr.oii.ox.ac.uk

          Language: English - Date: 2015-09-24 11:45:38
            58

            Proceedings on Privacy Enhancing Technologies 2015; ):61–76 Roya Ensafi*, Philipp Winter, Abdullah Mueen, and Jedidiah R. Crandall Keywords: Tor, GFW, censorship analysis, network measurement, idle scan

            Add to Reading List

            Source URL: nymity.ch

            Language: English - Date: 2015-12-05 00:04:55
              59Cyberwarfare / Internet censorship in China / Computing / Denial-of-service attacks / Internet activism / Human rights in China / Internet in China / Cyberspace / GreatFire / Baidu / Denial-of-service attack / GFW

              An Analysis of China’s “Great Cannon” Bill Marczak Nicholas Weaver Jakub Dalek Roya Ensafi UC Berkeley, Citizen Lab

              Add to Reading List

              Source URL: www.usenix.org

              Language: English
              60

              Protecting Tor from Sybils July 2, 2015 Philipp Winter, Roya Ensafi, Karsten Loesing, Nick Feamster

              Add to Reading List

              Source URL: nymity.ch

              Language: English - Date: 2015-09-21 15:23:41
                UPDATE