mirror of
https://github.com/NullHypothesis/censorbib.git
synced 2025-07-23 14:41:07 -04:00
Use https for censorbib.nymity.ch URLs.
Signed-off-by: Philipp Winter <phw@nymity.ch>
This commit is contained in:
parent
613a5f7829
commit
205ff6cd6c
1 changed files with 18 additions and 18 deletions
|
@ -97,7 +97,7 @@
|
|||
publisher = {IEEE},
|
||||
year = {2017},
|
||||
pages = {1113--1124},
|
||||
url = {http://censorbib.nymity.ch/pdf/Heydari2017a.pdf},
|
||||
url = {https://censorbib.nymity.ch/pdf/Heydari2017a.pdf},
|
||||
}
|
||||
|
||||
@inproceedings{Gebhart2017a,
|
||||
|
@ -393,7 +393,7 @@
|
|||
booktitle = {Workshop on Privacy in the Electronic Society},
|
||||
publisher = {ACM},
|
||||
year = {2015},
|
||||
url = {http://censorbib.nymity.ch/pdf/Vines2015a.pdf},
|
||||
url = {https://censorbib.nymity.ch/pdf/Vines2015a.pdf},
|
||||
}
|
||||
|
||||
@inproceedings{Tanash2015a,
|
||||
|
@ -402,7 +402,7 @@
|
|||
booktitle = {Workshop on Privacy in the Electronic Society},
|
||||
publisher = {ACM},
|
||||
year = {2015},
|
||||
url = {http://censorbib.nymity.ch/pdf/Tanash2015a.pdf},
|
||||
url = {https://censorbib.nymity.ch/pdf/Tanash2015a.pdf},
|
||||
}
|
||||
|
||||
@inproceedings{Ensafi2015b,
|
||||
|
@ -521,7 +521,7 @@
|
|||
number = {1},
|
||||
publisher = {De Gruyter Open},
|
||||
year = {2015},
|
||||
url = {http://censorbib.nymity.ch/pdf/Ensafi2015a.pdf},
|
||||
url = {https://censorbib.nymity.ch/pdf/Ensafi2015a.pdf},
|
||||
}
|
||||
|
||||
@article{Fifield2015a,
|
||||
|
@ -550,7 +550,7 @@
|
|||
booktitle = {International Conference on Advanced Communication Technology},
|
||||
publisher = {IEEE},
|
||||
year = {2014},
|
||||
url = {http://censorbib.nymity.ch/pdf/Wang2014a.pdf},
|
||||
url = {https://censorbib.nymity.ch/pdf/Wang2014a.pdf},
|
||||
}
|
||||
|
||||
@article{Gill2015a,
|
||||
|
@ -561,7 +561,7 @@
|
|||
year = {2015},
|
||||
volume = {9},
|
||||
number = {1},
|
||||
url = {http://censorbib.nymity.ch/pdf/Gill2015a.pdf},
|
||||
url = {https://censorbib.nymity.ch/pdf/Gill2015a.pdf},
|
||||
}
|
||||
|
||||
@inproceedings{Aase2012a,
|
||||
|
@ -653,7 +653,7 @@
|
|||
publisher = {USENIX},
|
||||
title = {{Internet} Censorship in {Iran}: A First Look},
|
||||
year = {2013},
|
||||
url = {http://censorbib.nymity.ch/pdf/Aryan2013a.pdf},
|
||||
url = {https://censorbib.nymity.ch/pdf/Aryan2013a.pdf},
|
||||
}
|
||||
|
||||
@article{Aycock2008a,
|
||||
|
@ -719,7 +719,7 @@
|
|||
publisher = {IEEE},
|
||||
title = {{SkyF2F}: Censorship Resistant via {Skype} Overlay Network},
|
||||
year = {2009},
|
||||
url = {http://censorbib.nymity.ch/pdf/Cao2009a.pdf},
|
||||
url = {https://censorbib.nymity.ch/pdf/Cao2009a.pdf},
|
||||
}
|
||||
|
||||
@inproceedings{Chaabane2014a,
|
||||
|
@ -929,7 +929,7 @@
|
|||
publisher = {USENIX},
|
||||
title = {Building Dissent Networks: Towards Effective Countermeasures against Large-Scale Communications Blackouts},
|
||||
year = {2013},
|
||||
url = {http://censorbib.nymity.ch/pdf/Hasan2013a.pdf},
|
||||
url = {https://censorbib.nymity.ch/pdf/Hasan2013a.pdf},
|
||||
}
|
||||
|
||||
@inproceedings{Houmansadr2011a,
|
||||
|
@ -1020,7 +1020,7 @@
|
|||
publisher = {USENIX},
|
||||
title = {Towards Illuminating a Censorship Monitor's Model to Facilitate Evasion},
|
||||
year = {2013},
|
||||
url = {http://censorbib.nymity.ch/pdf/Khattak2013a.pdf},
|
||||
url = {https://censorbib.nymity.ch/pdf/Khattak2013a.pdf},
|
||||
}
|
||||
|
||||
@inproceedings{Khattak2014a,
|
||||
|
@ -1067,7 +1067,7 @@
|
|||
publisher = {ACM},
|
||||
year = {2004},
|
||||
pages = {47--58},
|
||||
url = {http://censorbib.nymity.ch/pdf/Koepsell2004a.pdf},
|
||||
url = {https://censorbib.nymity.ch/pdf/Koepsell2004a.pdf},
|
||||
}
|
||||
|
||||
@inproceedings{Li2014a,
|
||||
|
@ -1165,7 +1165,7 @@
|
|||
publisher = {USENIX},
|
||||
title = {The Anatomy of Web Censorship in {Pakistan}},
|
||||
year = {2013},
|
||||
url = {http://censorbib.nymity.ch/pdf/Nabi2013a.pdf},
|
||||
url = {https://censorbib.nymity.ch/pdf/Nabi2013a.pdf},
|
||||
}
|
||||
|
||||
@inproceedings{Nobori2014a,
|
||||
|
@ -1194,7 +1194,7 @@
|
|||
publisher = {Springer},
|
||||
title = {Censorship Resistance Revisited},
|
||||
year = {2005},
|
||||
url = {http://censorbib.nymity.ch/pdf/Perng2005a.pdf},
|
||||
url = {https://censorbib.nymity.ch/pdf/Perng2005a.pdf},
|
||||
}
|
||||
|
||||
@inproceedings{Roberts2011a,
|
||||
|
@ -1213,7 +1213,7 @@
|
|||
title = {Secure Communication over Diverse Transports},
|
||||
year = {2012},
|
||||
pages = {75--80},
|
||||
url = {http://censorbib.nymity.ch/pdf/Rogers2012a.pdf},
|
||||
url = {https://censorbib.nymity.ch/pdf/Rogers2012a.pdf},
|
||||
}
|
||||
|
||||
@inproceedings{Roos2014a,
|
||||
|
@ -1277,7 +1277,7 @@
|
|||
booktitle = {CHI Conference on Human Factors in Computing Systems},
|
||||
publisher = {ACM},
|
||||
year = {2011},
|
||||
url = {http://censorbib.nymity.ch/pdf/Shklovski2011a.pdf},
|
||||
url = {https://censorbib.nymity.ch/pdf/Shklovski2011a.pdf},
|
||||
}
|
||||
|
||||
@inproceedings{Sovran2008a,
|
||||
|
@ -1339,7 +1339,7 @@
|
|||
publisher = {USENIX},
|
||||
title = {Five Incidents, One Theme: {Twitter} Spam as a Weapon to Drown Voices of Protest},
|
||||
year = {2013},
|
||||
url = {http://censorbib.nymity.ch/pdf/Verkamp2013a.pdf},
|
||||
url = {https://censorbib.nymity.ch/pdf/Verkamp2013a.pdf},
|
||||
}
|
||||
|
||||
@inproceedings{Wachs2013a,
|
||||
|
@ -1438,7 +1438,7 @@
|
|||
booktitle = {Free and Open Communications on the Internet},
|
||||
publisher = {USENIX},
|
||||
year = {2013},
|
||||
url = {http://censorbib.nymity.ch/pdf/Winter2013a.pdf},
|
||||
url = {https://censorbib.nymity.ch/pdf/Winter2013a.pdf},
|
||||
}
|
||||
|
||||
@inproceedings{Winter2013b,
|
||||
|
@ -1447,7 +1447,7 @@
|
|||
booktitle = {Workshop on Privacy in the Electronic Society},
|
||||
publisher = {ACM},
|
||||
year = {2013},
|
||||
url = {http://censorbib.nymity.ch/pdf/Winter2013b.pdf},
|
||||
url = {https://censorbib.nymity.ch/pdf/Winter2013b.pdf},
|
||||
}
|
||||
|
||||
@inproceedings{Wright2011a,
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue