Harmonise capitalisation of names.

This commit is contained in:
Philipp Winter 2016-07-20 11:26:19 -04:00
parent 49337a8d3c
commit 76bfa308b0

View file

@ -36,7 +36,7 @@
@inproceedings{Scott2016a,
author = {Will Scott and Thomas Anderson and Tadayoshi Kohno and Arvind Krishnamurthy},
title = {{S}atellite: Joint Analysis of {CDN}s and Network-Level Interference},
title = {{Satellite}: Joint Analysis of {CDN}s and Network-Level Interference},
booktitle = {USENIX Annual Technical Conference},
publisher = {USENIX},
year = {2016},
@ -45,7 +45,7 @@
@inproceedings{Aceto2016a,
author = {Giuseppe Aceto and Alessio Botta and Antonio Pescap\`{e} and M. Faheem Awan and Tahir Ahmad and Saad Qaisar},
title = {Analyzing {I}nternet Censorship in {P}akistan},
title = {Analyzing {Internet} Censorship in {Pakistan}},
booktitle = {Research and Technologies for Society and Industry},
publisher = {IEEE},
year = {2016},
@ -81,7 +81,7 @@
@article{Li2016a,
author = {Shuai Li and Nicholas Hopper},
title = {{M}ailet: Instant Social Networking under Censorship},
title = {{Mailet}: Instant Social Networking under Censorship},
journal = {Privacy Enhancing Technologies},
volume = {2016},
number = {2},
@ -93,7 +93,7 @@
@article{McPherson2016a,
author = {Richard McPherson and Amir Houmansadr and Vitaly Shmatikov},
title = {{C}overt{C}ast: Using Live Streaming to Evade Internet Censorship},
title = {{CovertCast}: Using Live Streaming to Evade Internet Censorship},
journal = {Privacy Enhancing Technologies},
volume = {2016},
number = {3},
@ -105,7 +105,7 @@
@inproceedings{Kohls2016a,
author = {Katharina Kohls and Thorsten Holz and Dorothea Kolossa and Christina P\"{o}pper},
title = {{S}kype{L}ine: Robust Hidden Data Transmission for {V}o{IP}},
title = {{SkypeLine}: Robust Hidden Data Transmission for {VoIP}},
booktitle = {ASIA Computer and Communications Security},
publisher = {ACM},
year = {2016},
@ -114,7 +114,7 @@
@article{Al-Saqaf2016a,
author = {Walid Al-Saqaf},
title = {{I}nternet Censorship Circumvention Tools: Escaping the Control of the {S}yrian Regime},
title = {{Internet} Censorship Circumvention Tools: Escaping the Control of the {Syrian} Regime},
journal = {Media and Communication},
volume = {4},
number = {1},
@ -125,7 +125,7 @@
@inproceedings{Tschantz2016a,
author = {Michael Carl Tschantz and Sadia Afroz and Anonymous and Vern Paxson},
title = {{S}o{K}: Towards Grounding Censorship Circumvention in Empiricism},
title = {{SoK}: Towards Grounding Censorship Circumvention in Empiricism},
booktitle = {Symposium on Security \& Privacy},
publisher = {IEEE},
year = {2016},
@ -134,7 +134,7 @@
@inproceedings{Hiruncharoenvate2015a,
author = {Chaya Hiruncharoenvate and Zhiyuan Lin and Eric Gilbert},
title = {Algorithmically Bypassing Censorship on {S}ina {W}eibo with Nondeterministic Homophone Substitutions},
title = {Algorithmically Bypassing Censorship on {Sina Weibo} with Nondeterministic Homophone Substitutions},
booktitle = {International Conference on Web and Social Media},
publisher = {AAAI},
year = {2015},
@ -161,7 +161,7 @@
@inproceedings{Vines2015a,
author = {Paul Vines and Tadayoshi Kohno},
title = {{R}ook: Using Video Games as a Low-Bandwidth Censorship Resistant Communication Platform},
title = {{Rook}: Using Video Games as a Low-Bandwidth Censorship Resistant Communication Platform},
booktitle = {Workshop on Privacy in the Electronic Society},
publisher = {ACM},
year = {2015},
@ -170,7 +170,7 @@
@inproceedings{Tanash2015a,
author = {Rima S. Tanash and Zhouhan Chen and Tanmay Thakur and Dan S. Wallach and Devika Subramanian},
title = {Known Unknowns: An Analysis of {T}witter Censorship in {T}urkey},
title = {Known Unknowns: An Analysis of {Twitter} Censorship in {Turkey}},
booktitle = {Workshop on Privacy in the Electronic Society},
publisher = {ACM},
year = {2015},
@ -179,7 +179,7 @@
@inproceedings{Ensafi2015b,
author = {Roya Ensafi and David Fifield and Philipp Winter and Nick Feamster and Nicholas Weaver and Vern Paxson},
title = {Examining How the {G}reat {F}irewall Discovers Hidden Circumvention Servers},
title = {Examining How the {Great Firewall} Discovers Hidden Circumvention Servers},
booktitle = {Internet Measurement Conference},
publisher = {ACM},
year = {2015},
@ -188,7 +188,7 @@
@inproceedings{Holowczak2015a,
author = {John Holowczak and Amir Houmansadr},
title = {{C}ache{B}rowser: Bypassing {C}hinese Censorship without Proxies Using Cached Content},
title = {{CacheBrowser}: Bypassing {Chinese} Censorship without Proxies Using Cached Content},
booktitle = {Computer and Communications Security},
publisher = {ACM},
year = {2015},
@ -206,7 +206,7 @@
@inproceedings{Crandall2015a,
author = {Jedidiah R. Crandall and Masashi Crete-Nishihata and Jeffrey Knockel},
title = {Forgive Us our {SYN}s: Technical and Ethical Considerations for Measuring {I}nternet Filtering},
title = {Forgive Us our {SYN}s: Technical and Ethical Considerations for Measuring {Internet} Filtering},
booktitle = {Ethics in Networked Systems Research},
publisher = {ACM},
year = {2015},
@ -215,7 +215,7 @@
@inproceedings{Smits2011a,
author = {Rob Smits and Divam Jain and Sarah Pidcock and Ian Goldberg and Urs Hengartner},
title = {{B}ridge{SPA}: Improving {T}or Bridges with Single Packet Authorization},
title = {{BridgeSPA}: Improving {Tor} Bridges with Single Packet Authorization},
booktitle = {Workshop on Privacy in the Electronic Society},
publisher = {ACM},
year = {2011},
@ -224,7 +224,7 @@
@inproceedings{Ververis2015a,
author = {Vasilis Ververis and George Kargiotakis and Arturo Filast\`{o} and Benjamin Fabian and Afentoulis Alexandros},
title = {Understanding {I}nternet Censorship Policy: The Case of {G}reece},
title = {Understanding {Internet} Censorship Policy: The Case of {Greece}},
booktitle = {Free and Open Communications on the Internet},
publisher = {USENIX},
year = {2015},
@ -233,7 +233,7 @@
@inproceedings{Knockel2015a,
author = {Jeffrey Knockel and Masashi Crete-Nishihata and Jason Q. Ng and Adam Senft and Jedidiah R. Crandall},
title = {Every Rose Has Its Thorn: Censorship and Surveillance on Social Video Platforms in {C}hina},
title = {Every Rose Has Its Thorn: Censorship and Surveillance on Social Video Platforms in {China}},
booktitle = {Free and Open Communications on the Internet},
publisher = {USENIX},
year = {2015},
@ -242,7 +242,7 @@
@inproceedings{Marczak2015a,
author = {Bill Marczak and Nicholas Weaver and Jakub Dalek and Roya Ensafi and David Fifield and Sarah McKune and Arn Rey and John Scott-Railton and Ron Deibert and Vern Paxson},
title = {An Analysis of {C}hina's ``{G}reat {C}annon''},
title = {An Analysis of {China}'s ``{Great Cannon}''},
booktitle = {Free and Open Communications on the Internet},
publisher = {USENIX},
year = {2015},
@ -251,7 +251,7 @@
@inproceedings{Dyer2015a,
author = {Kevin P. Dyer and Scott E. Coull and Thomas Shrimpton},
title = {Marionette: A Programmable Network-Traffic Obfuscation System},
title = {{Marionette}: A Programmable Network-Traffic Obfuscation System},
booktitle = {USENIX Security Symposium},
publisher = {USENIX},
year = {2015},
@ -260,7 +260,7 @@
@inproceedings{Burnett2015a,
author = {Sam Burnett and Nick Feamster},
title = {Encore: Lightweight Measurement of Web Censorship with Cross-Origin Requests},
title = {{Encore}: Lightweight Measurement of Web Censorship with Cross-Origin Requests},
booktitle = {SIGCOMM},
publisher = {ACM},
year = {2015},
@ -287,7 +287,7 @@
@article{Ensafi2015a,
author = {Roya Ensafi and Philipp Winter and Abdullah Mueen and Jedidiah R. Crandall},
title = {Analyzing the {G}reat {F}irewall of {C}hina Over Space and Time},
title = {Analyzing the {Great Firewall} of {China} Over Space and Time},
journal = {Privacy Enhancing Technologies},
volume = {2015},
number = {1},
@ -318,7 +318,7 @@
@inproceedings{Wang2014a,
author = {Yuzhi Wang and Ping Ji and Borui Ye and Pengjun Wang and Rong Luo and Huazhong Yang},
title = {Go{H}op: Personal {VPN} to Defend from Censorship},
title = {{GoHop}: Personal {VPN} to Defend from Censorship},
booktitle = {International Conference on Advanced Communication Technology},
publisher = {IEEE},
year = {2014},
@ -327,7 +327,7 @@
@article{Gill2015a,
author = {Phillipa Gill and Masashi Crete-Nishihata and Jakub Dalek and Sharon Goldberg and Adam Senft and Greg Wiseman},
title = {Characterizing Web Censorship Worldwide: Another Look at the {O}pen{N}et {I}nitiative Data},
title = {Characterizing Web Censorship Worldwide: Another Look at the {OpenNet Initiative} Data},
journal = {Transactions on the Web},
publisher = {ACM},
year = {2015},
@ -347,7 +347,7 @@
@article{Aceto2015b,
author = {Giuseppe Aceto and Antonio Pescap\`{e}},
title = {{I}nternet Censorship detection: A survey},
title = {{Internet} Censorship detection: A survey},
journal = {Computer Networks},
publisher = {Elsevier},
year = {2015},
@ -356,7 +356,7 @@
@inproceedings{Aceto2015a,
author = {Giuseppe Aceto and Alessio Botta and Antonio Pescap\`{e} and Nick Feamster and M. Faheem Awan and Tahir Ahmad and Saad Qaisar},
title = {Monitoring {I}nternet Censorship with {UBICA}},
title = {Monitoring {Internet} Censorship with {UBICA}},
booktitle = {Traffic Monitoring and Analysis},
publisher = {Springer},
year = {2015},
@ -368,14 +368,14 @@
booktitle = {Theory and Applications of Cryptology},
pages = {242--253},
publisher = {CTU Publishing House},
title = {The {E}ternity {S}ervice},
title = {The {Eternity} Service},
year = {1996},
url = {http://www.cl.cam.ac.uk/~rja14/Papers/eternity.pdf},
}
@techreport{Anderson2012a,
author = {Collin Anderson},
title = {The Hidden {I}nternet of {I}ran: Private Address Allocations on a National Network},
title = {The Hidden {Internet} of {Iran}: Private Address Allocations on a National Network},
institution = {},
year = {2012},
url = {http://arxiv.org/pdf/1209.6398v1},
@ -383,7 +383,7 @@
@techreport{Anderson2013a,
author = {Collin Anderson},
title = {Dimming the {I}nternet: Detecting Throttling as a Mechanism of Censorship in {I}ran},
title = {Dimming the {Internet}: Detecting Throttling as a Mechanism of Censorship in {Iran}},
institution = {University of Pennsylvania},
year = {2013},
url = {http://arxiv.org/pdf/1306.4361v1.pdf},
@ -393,14 +393,14 @@
author = {Collin Anderson and Philipp Winter and Roya},
booktitle = {Free and Open Communications on the Internet},
publisher = {USENIX},
title = {Global Network Interference Detection over the {RIPE} {A}tlas Network},
title = {Global Network Interference Detection over the {RIPE Atlas} Network},
year = {2014},
url = {https://www.usenix.org/system/files/conference/foci14/foci14-anderson.pdf},
}
@article{Sparks2012a,
author = {Sparks and Neo and Tank and Smith and Dozer},
title = {The Collateral Damage of {I}nternet Censorship by {DNS} Injection},
title = {The Collateral Damage of {Internet} Censorship by {DNS} Injection},
journal = {SIGCOMM Computer Communication Review},
volume = {42},
number = {3},
@ -414,7 +414,7 @@
author = {Anonymous},
booktitle = {Free and Open Communications on the Internet},
publisher = {USENIX},
title = {Towards a Comprehensive Picture of the {G}reat {F}irewall's {DNS} Censorship},
title = {Towards a Comprehensive Picture of the {Great Firewall}'s {DNS} Censorship},
year = {2014},
url = {https://www.usenix.org/system/files/conference/foci14/foci14-anonymous.pdf},
}
@ -423,7 +423,7 @@
author = {Simurgh Aryan and Homa Aryan and J. Alex Halderman},
booktitle = {Free and Open Communications on the Internet},
publisher = {USENIX},
title = {{I}nternet Censorship in {I}ran: A First Look},
title = {{Internet} Censorship in {Iran}: A First Look},
year = {2013},
url = {http://censorbib.nymity.ch/pdf/Aryan2013a.pdf},
}
@ -442,7 +442,7 @@
@techreport{Bachrach2011a,
author = {Dustin Bachrach and Christopher Nunu and Dan S. Wallach and Matthew Wright},
title = {\#h00t: Censorship Resistant Microblogging},
title = {{\#h00t}: Censorship Resistant Microblogging},
institution = {Rice University and University of Texas at Arlington},
year = {2011},
url = {http://arxiv.org/pdf/1109.6874v1.pdf},
@ -450,7 +450,7 @@
@inproceedings{Benson2013a,
author = {Karyn Benson and Alberto Dainotti and Kimberly Claffy and Emile Aben},
title = {Gaining Insight into {AS}-level Outages through Analysis of {I}nternet Background Radiation},
title = {Gaining Insight into {AS}-level Outages through Analysis of {Internet} Background Radiation},
booktitle = {Traffic Monitoring and Analysis},
publisher = {IEEE},
year = {2013},
@ -468,7 +468,7 @@
@inproceedings{Brubaker2014a,
author = {Chad Brubaker and Amir Houmansadr and Vitaly Shmatikov},
title = {{C}loud{T}ransport: Using Cloud Storage for Censorship-Resistant Networking},
title = {{CloudTransport}: Using Cloud Storage for Censorship-Resistant Networking},
booktitle = {Privacy Enhancing Technologies Symposium},
publisher = {Springer},
year = {2014},
@ -489,14 +489,14 @@
booktitle = {International Conference on Information Engineering},
pages = {350--354},
publisher = {IEEE},
title = {{S}ky{F2F}: Censorship Resistant via {S}kype Overlay Network},
title = {{SkyF2F}: Censorship Resistant via {Skype} Overlay Network},
year = {2009},
url = {http://censorbib.nymity.ch/pdf/Cao2009a.pdf},
}
@inproceedings{Chaabane2014a,
author = {Abdelberi Chaabane and Terence Chen and Mathieu Cunche and Emiliano De Cristofaro and Arik Friedman and Mohamed Ali Kaafar},
title = {Censorship in the Wild: Analyzing {I}nternet Filtering in {S}yria},
title = {Censorship in the Wild: Analyzing {Internet} Filtering in {Syria}},
booktitle = {Internet Measurement Conference},
publisher = {ACM},
year = {2014},
@ -505,7 +505,7 @@
@inproceedings{Chen2013a,
author = {Le Chen and Chi Zhang and Christo Wilson},
title = {Tweeting Under Pressure: Analyzing Trending Topics and Evolving Word Choice on {S}ina {W}eibo},
title = {Tweeting Under Pressure: Analyzing Trending Topics and Evolving Word Choice on {Sina Weibo}},
booktitle = {Conference on Online Social Networks},
publisher = {ACM},
year = {2013},
@ -517,7 +517,7 @@
booktitle = {Privacy Enhancing Technologies},
pages = {20--35},
publisher = {Springer},
title = {Ignoring the {G}reat {F}irewall of {C}hina},
title = {Ignoring the {Great Firewall} of {China}},
year = {2006},
url = {http://www.cl.cam.ac.uk/~rnc1/ignoring.pdf},
}
@ -546,7 +546,7 @@
booktitle = {Computer and Communications Security},
pages = {352--365},
publisher = {ACM},
title = {{C}oncept{D}oppler: A Weather Tracker for {I}nternet Censorship},
title = {{ConceptDoppler}: A Weather Tracker for {Internet} Censorship},
year = {2007},
url = {http://www.csd.uoc.gr/~hy558/papers/conceptdoppler.pdf},
}
@ -556,7 +556,7 @@
booktitle = {Internet Measurement Conference},
pages = {1--18},
publisher = {ACM},
title = {Analysis of Country-wide {I}nternet Outages Caused by Censorship},
title = {Analysis of Country-wide {Internet} Outages Caused by Censorship},
year = {2011},
url = {http://conferences.sigcomm.org/imc/2011/docs/p1.pdf},
}
@ -580,7 +580,7 @@
@techreport{Danezis2011a,
author = {Danezis, George},
title = {An anomaly-based censorship-detection system for {T}or},
title = {An anomaly-based censorship-detection system for {Tor}},
institution = {The Tor Project},
year = {2011},
url = {https://research.torproject.org/techreports/detector-2011-09-09.pdf}
@ -590,7 +590,7 @@
author = {Gregory Detal and Benjamin Hesmans and Olivier Bonaventure and Yves Vanaubel and Benoit Donnet},
booktitle = {Internet Measurement Conference},
publisher = {ACM},
title = {Revealing Middlebox Interference with {T}racebox},
title = {Revealing Middlebox Interference with {Tracebox}},
year = {2013},
url = {http://conferences.sigcomm.org/imc/2013/papers/imc032s-detalA.pdf},
}
@ -605,7 +605,7 @@
@inproceedings{Duan2012a,
author = {Haixin Duan and Nicholas Weaver and Zongxu Zhao and Meng Hu and Jinjin Liang and Jian Jiang and Kang Li and Vern Paxson},
title = {Hold-On: Protecting Against On-Path {DNS} Poisoning},
title = {{Hold-On}: Protecting Against On-Path {DNS} Poisoning},
booktitle = {Securing and Trusting Internet Names},
year = {2012},
publisher = {National Physical Laboratory},
@ -614,7 +614,7 @@
@inproceedings{Dyer2013a,
author = {Kevin P. Dyer and Scott E. Coull and Thomas Ristenpart and Thomas Shrimpton},
title = {Protocol Misidentification Made Easy with {F}ormat-{T}ransforming {E}ncryption},
title = {Protocol Misidentification Made Easy with {Format-Transforming Encryption}},
booktitle = {Computer and Communications Security},
year = {2013},
publisher = {ACM},
@ -623,7 +623,7 @@
@inproceedings{Ensafi2014a,
author = {Roya Ensafi and Jeffrey Knockel and Geoffrey Alexander and Jedidiah R. Crandall},
title = {Detecting Intentional Packet Drops on the {I}nternet via {TCP}/{IP} Side Channels},
title = {Detecting Intentional Packet Drops on the {Internet} via {TCP/IP} Side Channels},
booktitle = {Passive and Active Measurement Conference},
publisher = {Springer},
year = {2014},
@ -643,7 +643,7 @@
author = {Nick Feamster and Magdalena Balazinska and Greg Harfst and Hari Balakrishnan and David Karger},
booktitle = {USENIX Security Symposium},
publisher = {USENIX},
title = {{I}nfranet: Circumventing Web Censorship and Surveillance},
title = {{Infranet}: Circumventing Web Censorship and Surveillance},
year = {2002},
url = {http://wind.lcs.mit.edu/papers/usenixsec2002.pdf},
}
@ -709,7 +709,7 @@
booktitle = {Computer and Communications Security},
pages = {187--200},
publisher = {ACM},
title = {{C}irripede: Circumvention Infrastructure using Router Redirection with Plausible Deniability},
title = {{Cirripede}: Circumvention Infrastructure using Router Redirection with Plausible Deniability},
year = {2011},
url = {http://hatswitch.org/~nikita/papers/cirripede-ccs11.pdf},
}
@ -718,7 +718,7 @@
author = {Amir Houmansadr and Thomas Riedl and Nikita Borisov and Andrew Singer},
booktitle = {Network and Distributed System Security},
publisher = {The Internet Society},
title = {I want my voice to be heard: {IP} over {V}oice-over-{IP} for unobservable censorship circumvention},
title = {I want my voice to be heard: {IP} over Voice-over-{IP} for unobservable censorship circumvention},
year = {2013},
url = {http://people.cs.umass.edu/~amir/papers/FreeWave.pdf},
}
@ -744,7 +744,7 @@
@inproceedings{Invernizzi2013a,
author = {Luca Invernizzi and Christopher Kruegel and Giovanni Vigna},
booktitle = {Annual Computer Security Applications Conference},
title = {{M}essage {I}n {A} {B}ottle: Sailing Past Censorship},
title = {{Message In A Bottle}: Sailing Past Censorship},
publisher = {ACM},
year = {2013},
url = {https://seclab.cs.ucsb.edu/media/uploads/papers/invernizzi_miab_acsac_2013.pdf},
@ -754,7 +754,7 @@
author = {Ben Jones and Sam Burnett and Nick Feamster and Sean Donovan and Sarthak Grover and Sathya Gunasekaran and Karim Habak},
booktitle = {Free and Open Communications on the Internet},
publisher = {USENIX},
title = {{F}acade: High-Throughput, Deniable Censorship Circumvention Using Web Search},
title = {{Facade}: High-Throughput, Deniable Censorship Circumvention Using Web Search},
year = {2014},
url = {https://www.usenix.org/system/files/conference/foci14/foci14_jones-8-8-14.pdf},
}
@ -772,7 +772,7 @@
author = {Josh Karlin and Daniel Ellard and Alden W. Jackson and Christine E. Jones and Greg Lauer and David P. Mankins and W. Timothy Strayer},
booktitle = {Free and Open Communications on the Internet},
publisher = {USENIX},
title = {Decoy Routing: Toward Unblockable {I}nternet Communication},
title = {Decoy Routing: Toward Unblockable {Internet} Communication},
year = {2011},
url = {http://static.usenix.org/event/foci11/tech/final_files/Karlin.pdf},
}
@ -781,7 +781,7 @@
author = {Karl Kathuria},
booktitle = {Free and Open Communications on the Internet},
publisher = {USENIX},
title = {Bypassing {I}nternet Censorship for News Broadcasters},
title = {Bypassing {Internet} Censorship for News Broadcasters},
year = {2011},
url = {http://static.usenix.org/event/foci11/tech/final_files/Kathuria.pdf},
}
@ -797,7 +797,7 @@
@inproceedings{Khattak2014a,
author = {Sheharbano Khattak and Mobin Javed and Syed Ali Khayam and Zartash Afzal Uzmi and Vern Paxson},
title = {A Look at the Consequences of {I}nternet Censorship Through an {ISP} Lens},
title = {A Look at the Consequences of {Internet} Censorship Through an {ISP} Lens},
booktitle = {Internet Measurement Conference},
publisher = {ACM},
year = {2014},
@ -806,7 +806,7 @@
@article{King2014a,
author = {Gary King and Jennifer Pan and Margaret E. Roberts},
title = {Reverse-engineering censorship in {C}hina: Randomized experimentation and participant observation},
title = {Reverse-engineering censorship in {China}: Randomized experimentation and participant observation},
journal = {Science},
publisher = {AAAS},
year = {2014},
@ -818,7 +818,7 @@
@article{King2012a,
author = {Gary King and Jennifer Pan and Margaret E. Roberts},
journal = {American Political Science Review},
title = {How Censorship in {C}hina Allows Government Criticism but Silences Collective Expression},
title = {How Censorship in {China} Allows Government Criticism but Silences Collective Expression},
year = {2012},
url = {http://gking.harvard.edu/files/censored.pdf},
}
@ -827,7 +827,7 @@
author = {Jeffrey Knockel and Jedidiah R. Crandall and Jared Saia},
booktitle = {Free and Open Communications on the Internet},
publisher = {USENIX},
title = {Three Researchers, Five Conjectures: An Empirical Analysis of {TOM}-{S}kype Censorship and Surveillance},
title = {Three Researchers, Five Conjectures: An Empirical Analysis of {TOM-Skype} Censorship and Surveillance},
year = {2011},
url = {http://static.usenix.org/event/foci11/tech/final_files/Knockel.pdf},
}
@ -845,7 +845,7 @@
@inproceedings{Li2014a,
author = {Shuai Li and Mike Schliep and Nick Hopper},
booktitle = {Workshop on Privacy in the Electronic Society},
title = {{F}acet: Streaming over Videoconferencing for Censorship Circumvention},
title = {{Facet}: Streaming over Videoconferencing for Censorship Circumvention},
publisher = {ACM},
year = {2014},
url = {https://www-users.cs.umn.edu/~hopper/facet-wpes14.pdf},
@ -864,7 +864,7 @@
author = {Zhen Ling and Xinwen Fu and Wei Yu and Junzhou Luo and Ming Yang},
booktitle = {INFOCOM},
publisher = {IEEE},
title = {Extensive Analysis and Large-Scale Empirical Evaluation of {T}or Bridge Discovery},
title = {Extensive Analysis and Large-Scale Empirical Evaluation of {Tor} Bridge Discovery},
year = {2012},
url = {http://www.cs.uml.edu/~xinwenfu/paper/Bridge.pdf},
}
@ -873,14 +873,14 @@
author = {Vincent Liu and Seungyeop Han and Arvind Krishnamurthy and Thomas Anderson},
booktitle = {Hot Topics in Networks},
publisher = {ACM},
title = {{T}or Instead of {IP}},
title = {{Tor} Instead of {IP}},
year = {2011},
url = {http://conferences.sigcomm.org/hotnets/2011/papers/hotnetsX-final131.pdf},
}
@techreport{Lowe2007a,
author = {Graham Lowe and Patrick Winters and Michael L. Marcus},
title = {The Great {DNS} Wall of {C}hina},
title = {The Great {DNS} Wall of {China}},
institution = {New York University},
year = {2007},
url = {https://cs.nyu.edu/~pcw216/work/nds/final.pdf},
@ -890,7 +890,7 @@
author = {Daniel Luchaup and Kevin P. Dyer and Somesh Jha and Thomas Ristenpart and Thomas Shrimpton},
booktitle = {USENIX Security Symposium},
publisher = {USENIX},
title = {{L}ib{FTE}: A Toolkit for Constructing Practical, Format-Abiding Encryption Schemes},
title = {{LibFTE}: A Toolkit for Constructing Practical, Format-Abiding Encryption Schemes},
year = {2014},
url = {https://www.usenix.org/system/files/conference/usenixsecurity14/sec14-paper-luchaup.pdf},
}
@ -909,14 +909,14 @@
author = {Damon McCoy and Jose Andre Morales and Kirill Levchenko},
booktitle = {Financial Cryptography and Data Security},
publisher = {Springer},
title = {{P}roximax: A Measurement Based System for Proxies Dissemination},
title = {{Proximax}: A Measurement Based System for Proxies Dissemination},
year = {2011},
url = {http://cseweb.ucsd.edu/~klevchen/mml-fc11.pdf},
}
@inproceedings{Moghaddam2012a,
author = {Hooman Mohajeri Moghaddam and Baiyu Li and Mohammad Derakhshani and Ian Goldberg},
title = {{S}kype{M}orph: Protocol Obfuscation for {T}or Bridges},
title = {{SkypeMorph}: Protocol Obfuscation for {Tor} Bridges},
booktitle = {Computer and Communications Security},
year = {2012},
publisher = {ACM},
@ -935,7 +935,7 @@
author = {Zubair Nabi},
booktitle = {Free and Open Communications on the Internet},
publisher = {USENIX},
title = {The Anatomy of Web Censorship in {P}akistan},
title = {The Anatomy of Web Censorship in {Pakistan}},
year = {2013},
url = {http://censorbib.nymity.ch/pdf/Nabi2013a.pdf},
}
@ -944,7 +944,7 @@
author = {Daiyuu Nobori and Yasushi Shinjo},
booktitle = {Networked Systems Design and Implementation},
publisher = {USENIX},
title = {{VPN} {G}ate: A Volunteer-Organized Public {VPN} Relay System with Blocking Resistance for Bypassing Government Censorship Firewalls},
title = {{VPN Gate}: A Volunteer-Organized Public {VPN} Relay System with Blocking Resistance for Bypassing Government Censorship Firewalls},
year = {2014},
url = {https://www.usenix.org/system/files/conference/nsdi14/nsdi14-paper-nobori.pdf},
}
@ -954,7 +954,7 @@
booktitle = {Distributed Computing Systems},
pages = {315--326},
publisher = {IEEE},
title = {Empirical Study of a National-Scale Distributed Intrusion Detection System: Backbone-Level Filtering of {HTML} Responses in {C}hina},
title = {Empirical Study of a National-Scale Distributed Intrusion Detection System: Backbone-Level Filtering of {HTML} Responses in {China}},
year = {2010},
url = {http://www.cs.unm.edu/~crandall/icdcs2010.pdf},
}
@ -973,7 +973,7 @@
author = {Hal Roberts and David Larochelle and Rob Faris and John Palfrey},
booktitle = {Computer Communications Workshop},
publisher = {IEEE},
title = {Mapping Local {I}nternet Control},
title = {Mapping Local {Internet} Control},
year = {2011},
url = {https://cyber.law.harvard.edu/netmaps/mlic_20110513.pdf},
}
@ -990,7 +990,7 @@
@inproceedings{Roos2014a,
author = {Stefanie Roos and Benjamin Schiller and Stefan Hacker and Thorsten Strufe},
title = {Measuring {F}reenet in the Wild: Censorship-resilience under Observation},
title = {Measuring {Freenet} in the Wild: Censorship-resilience under Observation},
booktitle = {Privacy Enhancing Technologies Symposium},
publisher = {Springer},
year = {2014},
@ -1038,14 +1038,14 @@
author = {Andreas Sfakianakis and Elias Athanasopoulos and Sotiris Ioannidis},
booktitle = {Free and Open Communications on the Internet},
publisher = {USENIX},
title = {{C}ens{M}on: A Web Censorship Monitor},
title = {{CensMon}: A Web Censorship Monitor},
year = {2011},
url = {http://static.usenix.org/event/foci11/tech/final_files/Sfakianakis.pdf},
}
@inproceedings{Shklovski2011a,
author = {Irina Shklovski and Nalini P. Kotamraju},
title = {Online Contribution Practices in Countries that Engage in {I}nternet Blocking and Censorship},
title = {Online Contribution Practices in Countries that Engage in {Internet} Blocking and Censorship},
booktitle = {CHI Conference on Human Factors in Computing Systems},
publisher = {ACM},
year = {2011},
@ -1063,7 +1063,7 @@
@techreport{Stubblefield2001a,
author = {Adam Stubblefield and Dan S. Wallach},
title = {{D}agster: Censorship-Resistant Publishing Without Replication},
title = {{Dagster}: Censorship-Resistant Publishing Without Replication},
institution = {Rice University},
year = {2001},
url = {http://www.cs.rice.edu/~dwallach/pub/dagster-tr.pdf},
@ -1109,7 +1109,7 @@
author = {John-Paul Verkamp and Minaxi Gupta},
booktitle = {Free and Open Communications on the Internet},
publisher = {USENIX},
title = {Five Incidents, One Theme: {T}witter Spam as a Weapon to Drown Voices of Protest},
title = {Five Incidents, One Theme: {Twitter} Spam as a Weapon to Drown Voices of Protest},
year = {2013},
url = {http://censorbib.nymity.ch/pdf/Verkamp2013a.pdf},
}
@ -1134,7 +1134,7 @@
@inproceedings{Waldman2000a,
author = {Marc Waldman and Aviel D. Rubin and Lorrie Faith Cranor},
title = {{P}ublius: A robust, tamper-evident, censorship-resistant web publishing system},
title = {{Publius}: A robust, tamper-evident, censorship-resistant web publishing system},
booktitle = {USENIX Security Symposium},
publisher = {USENIX},
year = {2000},
@ -1143,7 +1143,7 @@
@inproceedings{Waldman2001a,
author = {Marc Waldman and David Mazi\`{e}res},
title = {{T}angler: A Censorship-Resistant Publishing System Based On Document Entanglements},
title = {{Tangler}: A Censorship-Resistant Publishing System Based On Document Entanglements},
booktitle = {Computer and Communications Security},
publisher = {ACM},
year = {2001},
@ -1153,7 +1153,7 @@
@inproceedings{Wang2012a,
author = {Qiyan Wang and Xun Gong and Giang T. K. Nguyen and Amir Houmansadr and Nikita Borisov},
title = {{C}ensor{S}poofer: Asymmetric Communication using {IP} Spoofing for Censorship-Resistant Web Browsing},
title = {{CensorSpoofer}: Asymmetric Communication using {IP} Spoofing for Censorship-Resistant Web Browsing},
booktitle = {Computer and Communications Security},
publisher = {ACM},
year = {2012},
@ -1162,7 +1162,7 @@
@inproceedings{Wang2013a,
author = {Qiyan Wang and Zi Lin and Nikita Borisov and Nicholas J. Hopper},
title = {r{B}ridge: User Reputation based {T}or Bridge Distribution with Privacy Preservation},
title = {{rBridge}: User Reputation based {Tor} Bridge Distribution with Privacy Preservation},
booktitle = {Network and Distributed System Security},
publisher = {The Internet Society},
year = {2013},
@ -1180,7 +1180,7 @@
@inproceedings{Weinberg2012a,
author = {Zachary Weinberg and Jeffrey Wang and Vinod Yegneswaran and Linda Briesemeister and Steven Cheung and Frank Wang and Dan Boneh},
title = {{S}tego{T}orus: A Camouflage Proxy for the {T}or Anonymity System},
title = {{StegoTorus}: A Camouflage Proxy for the {Tor} Anonymity System},
booktitle = {Computer and Communications Security},
publisher = {ACM},
year = {2012},
@ -1189,7 +1189,7 @@
@techreport{Wiley2011a,
author = {Brandon Wiley},
title = {{D}ust: A Blocking-Resistant {I}nternet Transport Protocol},
title = {{Dust}: A Blocking-Resistant {Internet} Transport Protocol},
institution = {University of Texas at Austin},
year = {2011},
url = {http://blanu.net/Dust.pdf},
@ -1197,7 +1197,7 @@
@inproceedings{Winter2012a,
author = {Philipp Winter and Stefan Lindskog},
title = {How the {G}reat {F}irewall of {C}hina is Blocking {T}or},
title = {How the {Great Firewall} of {China} is Blocking {Tor}},
booktitle = {Free and Open Communications on the Internet},
publisher = {USENIX},
year = {2012},
@ -1206,7 +1206,7 @@
@inproceedings{Winter2013a,
author = {Philipp Winter},
title = {Towards a Censorship Analyser for {T}or},
title = {Towards a Censorship Analyser for {Tor}},
booktitle = {Free and Open Communications on the Internet},
publisher = {USENIX},
year = {2013},
@ -1215,7 +1215,7 @@
@inproceedings{Winter2013b,
author = {Philipp Winter and Tobias Pulls and Juergen Fuss},
title = {{S}cramble{S}uit: A Polymorphic Network Protocol to Circumvent Censorship},
title = {{ScrambleSuit}: A Polymorphic Network Protocol to Circumvent Censorship},
booktitle = {Workshop on Privacy in the Electronic Society},
publisher = {ACM},
year = {2013},
@ -1233,7 +1233,7 @@
@techreport{Wright2012a,
author = {Joss Wright},
title = {Regional Variation in {C}hinese {I}nternet Filtering},
title = {Regional Variation in {Chinese Internet} Filtering},
institution = {University of Oxford},
year = {2012},
url = {http://papers.ssrn.com/sol3/Delivery.cfm/SSRN_ID2265775_code1448244.pdf?abstractid=2265775&mirid=3},
@ -1241,7 +1241,7 @@
@inproceedings{Wustrow2011a,
author = {Eric Wustrow and Scott Wolchok and Ian Goldberg and J. Alex Halderman},
title = {{T}elex: Anticensorship in the Network Infrastructure},
title = {{Telex}: Anticensorship in the Network Infrastructure},
booktitle = {USENIX Security Symposium},
publisher = {USENIX},
year = {2011},
@ -1250,7 +1250,7 @@
@inproceedings{Wustrow2014a,
author = {Eric Wustrow and Colleen M. Swanson and J. Alex Halderman},
title = {{T}ap{D}ance: End-to-Middle Anticensorship without Flow Blocking},
title = {{TapDance}: End-to-Middle Anticensorship without Flow Blocking},
booktitle = {USENIX Security Symposium},
publisher = {USENIX},
year = {2014},
@ -1259,7 +1259,7 @@
@inproceedings{Xu2011a,
author = {Xueyang Xu and Z. Morley Mao and J. Alex Halderman},
title = {{I}nternet Censorship in {C}hina: Where Does the Filtering Occur?},
title = {{Internet} Censorship in {China}: Where Does the Filtering Occur?},
booktitle = {Passive and Active Measurement Conference},
publisher = {Springer},
year = {2011},