Internet Anonymity in Syria, Challenges and Solution
暂无分享,去创建一个
[1] Matt Blaze,et al. Divertible Protocols and Atomic Proxy Cryptography , 1998, EUROCRYPT.
[2] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[3] Alan B. Johnston,et al. Internet Communications Using SIP: Delivering VoIP and Multimedia Services with Session Initiation Protocol , 2006 .
[4] Access Denied The Practice and Policy of Global Internet Filtering , 2008, CrimRxiv.
[5] Ronald J. Deibert,et al. Access Denied: The Practice and Policy of Global Internet Filtering - Book Review , 2009, IEEE Transactions on Professional Communication.
[6] Zhi-hong Zhang,et al. HTTP Proxy Server Based on Real-Time Link , 2010, 2010 International Conference on Multimedia Information Networking and Security.
[7] Marco Conti,et al. An efficient routing protocol for point-to-point elastic traffic in wireless mesh networks , 2011, 2011 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks.
[8] Qin Zhao,et al. Research and implementation of Layer Two Tunneling Protocol (L2TP) on carrier network , 2011, 2011 4th IEEE International Conference on Broadband Network and Multimedia Technology.
[9] Mon-Yen Luo,et al. Design and evaluation of deep packet inspection system: A case study , 2012, IET Networks.