A Blocking-Resistant Method for Anonymity System Based on Proxy and Data Hiding
暂无分享,去创建一个
[1] R. Dingledine,et al. Design of a blocking-resistant anonymity system , 2006 .
[2] Nick Feamster,et al. Infranet: Circumventing Web Censorship and Surveillance , 2002, USENIX Security Symposium.
[3] Stefan Köpsell,et al. How to achieve blocking resistance for existing systems enabling anonymous web surfing , 2004, WPES '04.
[4] Sun Shenghe. Multi-Dimension Random Parameter Insertion Algorithm in HTTP Protocol Communication Hiding , 2006 .
[5] S. Bradner,et al. A Directory Service for Perspective Access Networks , 2009, IEEE/ACM Transactions on Networking.
[6] Mema Roussopoulos,et al. Perspective access networks , 2006 .
[7] Robert Tappan Morris,et al. Tarzan: a peer-to-peer anonymizing network layer , 2002, CCS '02.
[8] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[9] Robert N. M. Watson,et al. Ignoring the Great Firewall of China , 2006, Privacy Enhancing Technologies.
[10] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.