mirror of
https://github.com/NullHypothesis/censorbib.git
synced 2025-07-25 23:45:52 -04:00
Add WPES'16 paper.
This commit is contained in:
parent
8c6af7616a
commit
4833f2108f
3 changed files with 13 additions and 1 deletions
|
@ -1,3 +1,6 @@
|
||||||
|
* 2016-10-28
|
||||||
|
- Added paper ``Poisoning the Well - Exploring the Great Firewall's Poisoned DNS Responses''
|
||||||
|
|
||||||
* 2016-09-16
|
* 2016-09-16
|
||||||
- Added paper ``Slitheen: Perfectly Imitated Decoy Routing through Traffic Replacement''
|
- Added paper ``Slitheen: Perfectly Imitated Decoy Routing through Traffic Replacement''
|
||||||
- Added paper ``Game of Decoys: Optimal Decoy Routing Through Game Theory''
|
- Added paper ``Game of Decoys: Optimal Decoy Routing Through Game Theory''
|
||||||
|
|
|
@ -83,7 +83,7 @@
|
||||||
(<a href="author_reverse.html">reverse</a>) <a href="author.html">author</a> <br />
|
(<a href="author_reverse.html">reverse</a>) <a href="author.html">author</a> <br />
|
||||||
Feedback: <a href="mailto:phw@nymity.ch">phw@nymity.ch</a> (<a
|
Feedback: <a href="mailto:phw@nymity.ch">phw@nymity.ch</a> (<a
|
||||||
href="https://nymity.ch/openpgp_public_key.txt">OpenPGP</a>) <br />
|
href="https://nymity.ch/openpgp_public_key.txt">OpenPGP</a>) <br />
|
||||||
Last updated: <a href="Changelog.txt">2016-09-16</a> <br />
|
Last updated: <a href="Changelog.txt">2016-10-28</a> <br />
|
||||||
</div>
|
</div>
|
||||||
</div>
|
</div>
|
||||||
</div>
|
</div>
|
||||||
|
|
|
@ -1,3 +1,12 @@
|
||||||
|
@inproceedings{Farnan2016a,
|
||||||
|
author = {Oliver Farnan and Alexander Darer and Joss Wright},
|
||||||
|
title = {Poisoning the Well -- Exploring the {Great} {Firewall}'s Poisoned {DNS} Responses},
|
||||||
|
booktitle = {Workshop on Privacy in the Electronic Society},
|
||||||
|
publisher = {ACM},
|
||||||
|
year = {2016},
|
||||||
|
url = {http://dl.acm.org/authorize?N25517},
|
||||||
|
}
|
||||||
|
|
||||||
@inproceedings{Bocovich2016a,
|
@inproceedings{Bocovich2016a,
|
||||||
author = {Cecylia Bocovich and Ian Goldberg},
|
author = {Cecylia Bocovich and Ian Goldberg},
|
||||||
title = {{Slitheen}: Perfectly Imitated Decoy Routing through Traffic Replacement},
|
title = {{Slitheen}: Perfectly Imitated Decoy Routing through Traffic Replacement},
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue