A user-driven free speech application for anonymous and verified online, public group discourse
暂无分享,去创建一个
Michael Nekrasov | Miriam J. Metzger | Elizabeth Belding | Miriam Metzger | Danny Iland | Lisa Parks | Lisa Parks | E. Belding-Royer | Daniel Iland | Michael Nekrasov | Danny Iland | Elizabeth Belding
[1] A. Strauss,et al. Grounded theory methodology: An overview. , 1994 .
[2] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[3] Çev. Fatih Canata. Sahte Haberleri Nasıl Saptarız , 2017 .
[4] Stefan Lindskog,et al. How the Great Firewall of China is Blocking Tor , 2012, FOCI.
[5] Yael Tauman Kalai,et al. How to Leak a Secret: Theory and Applications of Ring Signatures , 2001, Essays in Memory of Shimon Even.
[6] Elizabeth M. Belding-Royer,et al. Limits to Internet Freedoms: Being Heard in an Increasingly Authoritarian World , 2017, LIMITS.
[7] Marco Chiesa,et al. Analysis of country-wide internet outages caused by censorship , 2011, IMC '11.
[8] M. Gentzkow,et al. Social Media and Fake News in the 2016 Election , 2017 .
[9] Michelle R. Hebl,et al. Formal and Interpersonal Discrimination: A Field Study of Bias Toward Homosexual Applicants , 2002 .
[10] Joss Wright,et al. Internet Filtering in Liberal Democracies , 2012, FOCI.
[11] Fatih Canata. How to Spot Fake News ? , 2016 .
[12] Index , 1999, Neuroscience.
[13] Emiliano De Cristofaro,et al. Censorship in the Wild: Analyzing Internet Filtering in Syria , 2014, Internet Measurement Conference.
[14] J. Alex Halderman,et al. Internet Censorship in Iran: A First Look , 2013, FOCI.
[15] Rahul Mukherjee,et al. From platform jumping to self-censorship: internet freedom, social media, and circumvention practices in Zambia , 2017 .
[16] Benjamin Edelman,et al. Internet Filtering in China , 2003, IEEE Internet Comput..
[17] David Chaum,et al. Group Signatures , 1991, EUROCRYPT.
[19] Eric Puybaret,et al. Universal Declaration of Human Rights , 2006 .
[20] Sanja Kelly,et al. Freedom on the net 2015: privatizing censorship, eroding privacy , 2015 .
[21] Zubair Nabi. The Anatomy of Web Censorship in Pakistan , 2013, FOCI.
[22] Ben Y. Zhao,et al. SecurePost: Verified Group-Anonymity on Social Media , 2017, FOCI @ USENIX Security Symposium.
[23] Minaxi Gupta,et al. Five Incidents, One Theme: Twitter Spam as a Weapon to Drown Voices of Protest , 2013, FOCI.
[24] Ben Y. Zhao,et al. Uncovering social network sybils in the wild , 2011, IMC '11.
[25] David Boersema,et al. UNIVERSAL DECLARATION OF HUMAN RIGHTS (1948) , 2019, The Rights of Refugees under International Law.
[26] D. Rennie. Grounded Theory Methodology , 1998 .
[27] Bryan C. Semaan,et al. A Confucian Look at Internet Censorship in China , 2017, INTERACT.
[28] Margaret E. Roberts,et al. How Censorship in China Allows Government Criticism but Silences Collective Expression , 2013, American Political Science Review.
[29] Jedidiah R. Crandall,et al. ConceptDoppler: a weather tracker for internet censorship , 2007, CCS '07.