dg.o '07 Proceedings of the 8th annual international conference on Digital government research: bridging disciplines & domains
ACM SIGCAS Computers and Society
Global Freedom of Expression Within Nontextual Frameworks
The Information Society
Membership-concealing overlay networks
Proceedings of the 16th ACM conference on Computer and communications security
Online contribution practices in countries that engage in internet blocking and censorship
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Enhancing the Social Issues Components in our Computing Curriculum: Computing for the Social Good
Proceedings of the 2010 ITiCSE working group reports
Cirripede: circumvention infrastructure using router redirection with plausible deniability
Proceedings of the 18th ACM conference on Computer and communications security
Using clustering to detect Chinese censorware
Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research
CensorSpoofer: asymmetric communication using IP spoofing for censorship-resistant web browsing
Proceedings of the 2012 ACM conference on Computer and communications security
The velocity of censorship: high-fidelity detection of microblog post deletions
SEC'13 Proceedings of the 22nd USENIX conference on Security
Hi-index | 0.00 |
The Chinese government has made few official statements about its filtering of Internet content, but this report explores the scope, depth, and various methods used to selectively bar to Internet access through networks in China.