Arithmetic coding for data compression
Communications of the ACM
Crowds: anonymity for Web transactions
ACM Transactions on Information and System Security (TISSEC)
Asymptotically good codes correcting insertions, deletions, and transpositions
SODA '97 Proceedings of the eighth annual ACM-SIAM symposium on Discrete algorithms
A note on the confinement problem
Communications of the ACM
Tangler: a censorship-resistant publishing system based on document entanglements
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
Writing Apache Modules with PERL and C
Writing Apache Modules with PERL and C
Elliptic Curve Public Key Cryptosystems
Elliptic Curve Public Key Cryptosystems
Deanonymizing Users of the SafeWeb Anonymizing Service
Proceedings of the 11th USENIX Security Symposium
Protocols for Asymmetric Communication Channels
FOCS '98 Proceedings of the 39th Annual Symposium on Foundations of Computer Science
Publius: a robust, tamper-evident, censorship-resistant web publishing system
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
Defending against statistical steganalysis
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Fingerprinting websites using traffic analysis
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
Deanonymizing Users of the SafeWeb Anonymizing Service
Proceedings of the 11th USENIX Security Symposium
New covert channels in HTTP: adding unwitting Web browsers to anonymity sets
Proceedings of the 2003 ACM workshop on Privacy in the electronic society
How to achieve blocking resistance for existing systems enabling anonymous web surfing
Proceedings of the 2004 ACM workshop on Privacy in the electronic society
Collecting correlated information from a sensor network
SODA '05 Proceedings of the sixteenth annual ACM-SIAM symposium on Discrete algorithms
Lower bounds for asymmetric communication channels and distributed source coding
SODA '06 Proceedings of the seventeenth annual ACM-SIAM symposium on Discrete algorithm
VizSec '08 Proceedings of the 5th international workshop on Visualization for Computer Security
Dynamic asymmetric communication
Information Processing Letters
A directory service for perspective access networks
IEEE/ACM Transactions on Networking (TON)
Membership-concealing overlay networks
Proceedings of the 16th ACM conference on Computer and communications security
An approach towards anomaly based detection and profiling covert TCP/IP channels
ICICS'09 Proceedings of the 7th international conference on Information, communications and signal processing
Pass it on: social networks stymie censors
IPTPS'08 Proceedings of the 7th international conference on Peer-to-peer systems
Chipping away at censorship firewalls with user-generated content
USENIX Security'10 Proceedings of the 19th USENIX conference on Security
On preserving privacy in content-oriented networks
Proceedings of the ACM SIGCOMM workshop on Information-centric networking
Covert communications despite traffic data retention
Security'08 Proceedings of the 16th International conference on Security protocols
Telex: anticensorship in the network infrastructure
SEC'11 Proceedings of the 20th USENIX conference on Security
Cirripede: circumvention infrastructure using router redirection with plausible deniability
Proceedings of the 18th ACM conference on Computer and communications security
A framework for avoiding steganography usage over HTTP
Journal of Network and Computer Applications
Dynamic asymmetric communication
SIROCCO'06 Proceedings of the 13th international conference on Structural Information and Communication Complexity
Scrambling for lightweight censorship resistance
SP'11 Proceedings of the 19th international conference on Security Protocols
Evading censorship with browser-based proxies
PETS'12 Proceedings of the 12th international conference on Privacy Enhancing Technologies
StegoTorus: a camouflage proxy for the Tor anonymity system
Proceedings of the 2012 ACM conference on Computer and communications security
CensorSpoofer: asymmetric communication using IP spoofing for censorship-resistant web browsing
Proceedings of the 2012 ACM conference on Computer and communications security
Cloak: a ten-fold way for reliable covert communications
ESORICS'07 Proceedings of the 12th European conference on Research in Computer Security
Making sense of internet censorship: a new frontier for internet measurement
ACM SIGCOMM Computer Communication Review
Protocol misidentification made easy with format-transforming encryption
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Message in a bottle: sailing past censorship
Proceedings of the 29th Annual Computer Security Applications Conference
Validating web content with senser
Proceedings of the 29th Annual Computer Security Applications Conference
NSDI'14 Proceedings of the 11th USENIX Conference on Networked Systems Design and Implementation
Hi-index | 0.00 |