From 76bfa308b0960383372221290589418fd041f4bb Mon Sep 17 00:00:00 2001 From: Philipp Winter Date: Wed, 20 Jul 2016 11:26:19 -0400 Subject: [PATCH] Harmonise capitalisation of names. --- references.bib | 170 ++++++++++++++++++++++++------------------------- 1 file changed, 85 insertions(+), 85 deletions(-) diff --git a/references.bib b/references.bib index 859d184..248eb12 100644 --- a/references.bib +++ b/references.bib @@ -36,7 +36,7 @@ @inproceedings{Scott2016a, author = {Will Scott and Thomas Anderson and Tadayoshi Kohno and Arvind Krishnamurthy}, - title = {{S}atellite: Joint Analysis of {CDN}s and Network-Level Interference}, + title = {{Satellite}: Joint Analysis of {CDN}s and Network-Level Interference}, booktitle = {USENIX Annual Technical Conference}, publisher = {USENIX}, year = {2016}, @@ -45,7 +45,7 @@ @inproceedings{Aceto2016a, author = {Giuseppe Aceto and Alessio Botta and Antonio Pescap\`{e} and M. Faheem Awan and Tahir Ahmad and Saad Qaisar}, - title = {Analyzing {I}nternet Censorship in {P}akistan}, + title = {Analyzing {Internet} Censorship in {Pakistan}}, booktitle = {Research and Technologies for Society and Industry}, publisher = {IEEE}, year = {2016}, @@ -81,7 +81,7 @@ @article{Li2016a, author = {Shuai Li and Nicholas Hopper}, - title = {{M}ailet: Instant Social Networking under Censorship}, + title = {{Mailet}: Instant Social Networking under Censorship}, journal = {Privacy Enhancing Technologies}, volume = {2016}, number = {2}, @@ -93,7 +93,7 @@ @article{McPherson2016a, author = {Richard McPherson and Amir Houmansadr and Vitaly Shmatikov}, - title = {{C}overt{C}ast: Using Live Streaming to Evade Internet Censorship}, + title = {{CovertCast}: Using Live Streaming to Evade Internet Censorship}, journal = {Privacy Enhancing Technologies}, volume = {2016}, number = {3}, @@ -105,7 +105,7 @@ @inproceedings{Kohls2016a, author = {Katharina Kohls and Thorsten Holz and Dorothea Kolossa and Christina P\"{o}pper}, - title = {{S}kype{L}ine: Robust Hidden Data Transmission for {V}o{IP}}, + title = {{SkypeLine}: Robust Hidden Data Transmission for {VoIP}}, booktitle = {ASIA Computer and Communications Security}, publisher = {ACM}, year = {2016}, @@ -114,7 +114,7 @@ @article{Al-Saqaf2016a, author = {Walid Al-Saqaf}, - title = {{I}nternet Censorship Circumvention Tools: Escaping the Control of the {S}yrian Regime}, + title = {{Internet} Censorship Circumvention Tools: Escaping the Control of the {Syrian} Regime}, journal = {Media and Communication}, volume = {4}, number = {1}, @@ -125,7 +125,7 @@ @inproceedings{Tschantz2016a, author = {Michael Carl Tschantz and Sadia Afroz and Anonymous and Vern Paxson}, - title = {{S}o{K}: Towards Grounding Censorship Circumvention in Empiricism}, + title = {{SoK}: Towards Grounding Censorship Circumvention in Empiricism}, booktitle = {Symposium on Security \& Privacy}, publisher = {IEEE}, year = {2016}, @@ -134,7 +134,7 @@ @inproceedings{Hiruncharoenvate2015a, author = {Chaya Hiruncharoenvate and Zhiyuan Lin and Eric Gilbert}, - title = {Algorithmically Bypassing Censorship on {S}ina {W}eibo with Nondeterministic Homophone Substitutions}, + title = {Algorithmically Bypassing Censorship on {Sina Weibo} with Nondeterministic Homophone Substitutions}, booktitle = {International Conference on Web and Social Media}, publisher = {AAAI}, year = {2015}, @@ -161,7 +161,7 @@ @inproceedings{Vines2015a, author = {Paul Vines and Tadayoshi Kohno}, - title = {{R}ook: Using Video Games as a Low-Bandwidth Censorship Resistant Communication Platform}, + title = {{Rook}: Using Video Games as a Low-Bandwidth Censorship Resistant Communication Platform}, booktitle = {Workshop on Privacy in the Electronic Society}, publisher = {ACM}, year = {2015}, @@ -170,7 +170,7 @@ @inproceedings{Tanash2015a, author = {Rima S. Tanash and Zhouhan Chen and Tanmay Thakur and Dan S. Wallach and Devika Subramanian}, - title = {Known Unknowns: An Analysis of {T}witter Censorship in {T}urkey}, + title = {Known Unknowns: An Analysis of {Twitter} Censorship in {Turkey}}, booktitle = {Workshop on Privacy in the Electronic Society}, publisher = {ACM}, year = {2015}, @@ -179,7 +179,7 @@ @inproceedings{Ensafi2015b, author = {Roya Ensafi and David Fifield and Philipp Winter and Nick Feamster and Nicholas Weaver and Vern Paxson}, - title = {Examining How the {G}reat {F}irewall Discovers Hidden Circumvention Servers}, + title = {Examining How the {Great Firewall} Discovers Hidden Circumvention Servers}, booktitle = {Internet Measurement Conference}, publisher = {ACM}, year = {2015}, @@ -188,7 +188,7 @@ @inproceedings{Holowczak2015a, author = {John Holowczak and Amir Houmansadr}, - title = {{C}ache{B}rowser: Bypassing {C}hinese Censorship without Proxies Using Cached Content}, + title = {{CacheBrowser}: Bypassing {Chinese} Censorship without Proxies Using Cached Content}, booktitle = {Computer and Communications Security}, publisher = {ACM}, year = {2015}, @@ -206,7 +206,7 @@ @inproceedings{Crandall2015a, author = {Jedidiah R. Crandall and Masashi Crete-Nishihata and Jeffrey Knockel}, - title = {Forgive Us our {SYN}s: Technical and Ethical Considerations for Measuring {I}nternet Filtering}, + title = {Forgive Us our {SYN}s: Technical and Ethical Considerations for Measuring {Internet} Filtering}, booktitle = {Ethics in Networked Systems Research}, publisher = {ACM}, year = {2015}, @@ -215,7 +215,7 @@ @inproceedings{Smits2011a, author = {Rob Smits and Divam Jain and Sarah Pidcock and Ian Goldberg and Urs Hengartner}, - title = {{B}ridge{SPA}: Improving {T}or Bridges with Single Packet Authorization}, + title = {{BridgeSPA}: Improving {Tor} Bridges with Single Packet Authorization}, booktitle = {Workshop on Privacy in the Electronic Society}, publisher = {ACM}, year = {2011}, @@ -224,7 +224,7 @@ @inproceedings{Ververis2015a, author = {Vasilis Ververis and George Kargiotakis and Arturo Filast\`{o} and Benjamin Fabian and Afentoulis Alexandros}, - title = {Understanding {I}nternet Censorship Policy: The Case of {G}reece}, + title = {Understanding {Internet} Censorship Policy: The Case of {Greece}}, booktitle = {Free and Open Communications on the Internet}, publisher = {USENIX}, year = {2015}, @@ -233,7 +233,7 @@ @inproceedings{Knockel2015a, author = {Jeffrey Knockel and Masashi Crete-Nishihata and Jason Q. Ng and Adam Senft and Jedidiah R. Crandall}, - title = {Every Rose Has Its Thorn: Censorship and Surveillance on Social Video Platforms in {C}hina}, + title = {Every Rose Has Its Thorn: Censorship and Surveillance on Social Video Platforms in {China}}, booktitle = {Free and Open Communications on the Internet}, publisher = {USENIX}, year = {2015}, @@ -242,7 +242,7 @@ @inproceedings{Marczak2015a, author = {Bill Marczak and Nicholas Weaver and Jakub Dalek and Roya Ensafi and David Fifield and Sarah McKune and Arn Rey and John Scott-Railton and Ron Deibert and Vern Paxson}, - title = {An Analysis of {C}hina's ``{G}reat {C}annon''}, + title = {An Analysis of {China}'s ``{Great Cannon}''}, booktitle = {Free and Open Communications on the Internet}, publisher = {USENIX}, year = {2015}, @@ -251,7 +251,7 @@ @inproceedings{Dyer2015a, author = {Kevin P. Dyer and Scott E. Coull and Thomas Shrimpton}, - title = {Marionette: A Programmable Network-Traffic Obfuscation System}, + title = {{Marionette}: A Programmable Network-Traffic Obfuscation System}, booktitle = {USENIX Security Symposium}, publisher = {USENIX}, year = {2015}, @@ -260,7 +260,7 @@ @inproceedings{Burnett2015a, author = {Sam Burnett and Nick Feamster}, - title = {Encore: Lightweight Measurement of Web Censorship with Cross-Origin Requests}, + title = {{Encore}: Lightweight Measurement of Web Censorship with Cross-Origin Requests}, booktitle = {SIGCOMM}, publisher = {ACM}, year = {2015}, @@ -287,7 +287,7 @@ @article{Ensafi2015a, author = {Roya Ensafi and Philipp Winter and Abdullah Mueen and Jedidiah R. Crandall}, - title = {Analyzing the {G}reat {F}irewall of {C}hina Over Space and Time}, + title = {Analyzing the {Great Firewall} of {China} Over Space and Time}, journal = {Privacy Enhancing Technologies}, volume = {2015}, number = {1}, @@ -318,7 +318,7 @@ @inproceedings{Wang2014a, author = {Yuzhi Wang and Ping Ji and Borui Ye and Pengjun Wang and Rong Luo and Huazhong Yang}, - title = {Go{H}op: Personal {VPN} to Defend from Censorship}, + title = {{GoHop}: Personal {VPN} to Defend from Censorship}, booktitle = {International Conference on Advanced Communication Technology}, publisher = {IEEE}, year = {2014}, @@ -327,7 +327,7 @@ @article{Gill2015a, author = {Phillipa Gill and Masashi Crete-Nishihata and Jakub Dalek and Sharon Goldberg and Adam Senft and Greg Wiseman}, - title = {Characterizing Web Censorship Worldwide: Another Look at the {O}pen{N}et {I}nitiative Data}, + title = {Characterizing Web Censorship Worldwide: Another Look at the {OpenNet Initiative} Data}, journal = {Transactions on the Web}, publisher = {ACM}, year = {2015}, @@ -347,7 +347,7 @@ @article{Aceto2015b, author = {Giuseppe Aceto and Antonio Pescap\`{e}}, - title = {{I}nternet Censorship detection: A survey}, + title = {{Internet} Censorship detection: A survey}, journal = {Computer Networks}, publisher = {Elsevier}, year = {2015}, @@ -356,7 +356,7 @@ @inproceedings{Aceto2015a, author = {Giuseppe Aceto and Alessio Botta and Antonio Pescap\`{e} and Nick Feamster and M. Faheem Awan and Tahir Ahmad and Saad Qaisar}, - title = {Monitoring {I}nternet Censorship with {UBICA}}, + title = {Monitoring {Internet} Censorship with {UBICA}}, booktitle = {Traffic Monitoring and Analysis}, publisher = {Springer}, year = {2015}, @@ -368,14 +368,14 @@ booktitle = {Theory and Applications of Cryptology}, pages = {242--253}, publisher = {CTU Publishing House}, - title = {The {E}ternity {S}ervice}, + title = {The {Eternity} Service}, year = {1996}, url = {http://www.cl.cam.ac.uk/~rja14/Papers/eternity.pdf}, } @techreport{Anderson2012a, author = {Collin Anderson}, - title = {The Hidden {I}nternet of {I}ran: Private Address Allocations on a National Network}, + title = {The Hidden {Internet} of {Iran}: Private Address Allocations on a National Network}, institution = {}, year = {2012}, url = {http://arxiv.org/pdf/1209.6398v1}, @@ -383,7 +383,7 @@ @techreport{Anderson2013a, author = {Collin Anderson}, - title = {Dimming the {I}nternet: Detecting Throttling as a Mechanism of Censorship in {I}ran}, + title = {Dimming the {Internet}: Detecting Throttling as a Mechanism of Censorship in {Iran}}, institution = {University of Pennsylvania}, year = {2013}, url = {http://arxiv.org/pdf/1306.4361v1.pdf}, @@ -393,14 +393,14 @@ author = {Collin Anderson and Philipp Winter and Roya}, booktitle = {Free and Open Communications on the Internet}, publisher = {USENIX}, - title = {Global Network Interference Detection over the {RIPE} {A}tlas Network}, + title = {Global Network Interference Detection over the {RIPE Atlas} Network}, year = {2014}, url = {https://www.usenix.org/system/files/conference/foci14/foci14-anderson.pdf}, } @article{Sparks2012a, author = {Sparks and Neo and Tank and Smith and Dozer}, - title = {The Collateral Damage of {I}nternet Censorship by {DNS} Injection}, + title = {The Collateral Damage of {Internet} Censorship by {DNS} Injection}, journal = {SIGCOMM Computer Communication Review}, volume = {42}, number = {3}, @@ -414,7 +414,7 @@ author = {Anonymous}, booktitle = {Free and Open Communications on the Internet}, publisher = {USENIX}, - title = {Towards a Comprehensive Picture of the {G}reat {F}irewall's {DNS} Censorship}, + title = {Towards a Comprehensive Picture of the {Great Firewall}'s {DNS} Censorship}, year = {2014}, url = {https://www.usenix.org/system/files/conference/foci14/foci14-anonymous.pdf}, } @@ -423,7 +423,7 @@ author = {Simurgh Aryan and Homa Aryan and J. Alex Halderman}, booktitle = {Free and Open Communications on the Internet}, publisher = {USENIX}, - title = {{I}nternet Censorship in {I}ran: A First Look}, + title = {{Internet} Censorship in {Iran}: A First Look}, year = {2013}, url = {http://censorbib.nymity.ch/pdf/Aryan2013a.pdf}, } @@ -442,7 +442,7 @@ @techreport{Bachrach2011a, author = {Dustin Bachrach and Christopher Nunu and Dan S. Wallach and Matthew Wright}, - title = {\#h00t: Censorship Resistant Microblogging}, + title = {{\#h00t}: Censorship Resistant Microblogging}, institution = {Rice University and University of Texas at Arlington}, year = {2011}, url = {http://arxiv.org/pdf/1109.6874v1.pdf}, @@ -450,7 +450,7 @@ @inproceedings{Benson2013a, author = {Karyn Benson and Alberto Dainotti and Kimberly Claffy and Emile Aben}, - title = {Gaining Insight into {AS}-level Outages through Analysis of {I}nternet Background Radiation}, + title = {Gaining Insight into {AS}-level Outages through Analysis of {Internet} Background Radiation}, booktitle = {Traffic Monitoring and Analysis}, publisher = {IEEE}, year = {2013}, @@ -468,7 +468,7 @@ @inproceedings{Brubaker2014a, author = {Chad Brubaker and Amir Houmansadr and Vitaly Shmatikov}, - title = {{C}loud{T}ransport: Using Cloud Storage for Censorship-Resistant Networking}, + title = {{CloudTransport}: Using Cloud Storage for Censorship-Resistant Networking}, booktitle = {Privacy Enhancing Technologies Symposium}, publisher = {Springer}, year = {2014}, @@ -489,14 +489,14 @@ booktitle = {International Conference on Information Engineering}, pages = {350--354}, publisher = {IEEE}, - title = {{S}ky{F2F}: Censorship Resistant via {S}kype Overlay Network}, + title = {{SkyF2F}: Censorship Resistant via {Skype} Overlay Network}, year = {2009}, url = {http://censorbib.nymity.ch/pdf/Cao2009a.pdf}, } @inproceedings{Chaabane2014a, author = {Abdelberi Chaabane and Terence Chen and Mathieu Cunche and Emiliano De Cristofaro and Arik Friedman and Mohamed Ali Kaafar}, - title = {Censorship in the Wild: Analyzing {I}nternet Filtering in {S}yria}, + title = {Censorship in the Wild: Analyzing {Internet} Filtering in {Syria}}, booktitle = {Internet Measurement Conference}, publisher = {ACM}, year = {2014}, @@ -505,7 +505,7 @@ @inproceedings{Chen2013a, author = {Le Chen and Chi Zhang and Christo Wilson}, - title = {Tweeting Under Pressure: Analyzing Trending Topics and Evolving Word Choice on {S}ina {W}eibo}, + title = {Tweeting Under Pressure: Analyzing Trending Topics and Evolving Word Choice on {Sina Weibo}}, booktitle = {Conference on Online Social Networks}, publisher = {ACM}, year = {2013}, @@ -517,7 +517,7 @@ booktitle = {Privacy Enhancing Technologies}, pages = {20--35}, publisher = {Springer}, - title = {Ignoring the {G}reat {F}irewall of {C}hina}, + title = {Ignoring the {Great Firewall} of {China}}, year = {2006}, url = {http://www.cl.cam.ac.uk/~rnc1/ignoring.pdf}, } @@ -546,7 +546,7 @@ booktitle = {Computer and Communications Security}, pages = {352--365}, publisher = {ACM}, - title = {{C}oncept{D}oppler: A Weather Tracker for {I}nternet Censorship}, + title = {{ConceptDoppler}: A Weather Tracker for {Internet} Censorship}, year = {2007}, url = {http://www.csd.uoc.gr/~hy558/papers/conceptdoppler.pdf}, } @@ -556,7 +556,7 @@ booktitle = {Internet Measurement Conference}, pages = {1--18}, publisher = {ACM}, - title = {Analysis of Country-wide {I}nternet Outages Caused by Censorship}, + title = {Analysis of Country-wide {Internet} Outages Caused by Censorship}, year = {2011}, url = {http://conferences.sigcomm.org/imc/2011/docs/p1.pdf}, } @@ -580,7 +580,7 @@ @techreport{Danezis2011a, author = {Danezis, George}, - title = {An anomaly-based censorship-detection system for {T}or}, + title = {An anomaly-based censorship-detection system for {Tor}}, institution = {The Tor Project}, year = {2011}, url = {https://research.torproject.org/techreports/detector-2011-09-09.pdf} @@ -590,7 +590,7 @@ author = {Gregory Detal and Benjamin Hesmans and Olivier Bonaventure and Yves Vanaubel and Benoit Donnet}, booktitle = {Internet Measurement Conference}, publisher = {ACM}, - title = {Revealing Middlebox Interference with {T}racebox}, + title = {Revealing Middlebox Interference with {Tracebox}}, year = {2013}, url = {http://conferences.sigcomm.org/imc/2013/papers/imc032s-detalA.pdf}, } @@ -605,7 +605,7 @@ @inproceedings{Duan2012a, author = {Haixin Duan and Nicholas Weaver and Zongxu Zhao and Meng Hu and Jinjin Liang and Jian Jiang and Kang Li and Vern Paxson}, - title = {Hold-On: Protecting Against On-Path {DNS} Poisoning}, + title = {{Hold-On}: Protecting Against On-Path {DNS} Poisoning}, booktitle = {Securing and Trusting Internet Names}, year = {2012}, publisher = {National Physical Laboratory}, @@ -614,7 +614,7 @@ @inproceedings{Dyer2013a, author = {Kevin P. Dyer and Scott E. Coull and Thomas Ristenpart and Thomas Shrimpton}, - title = {Protocol Misidentification Made Easy with {F}ormat-{T}ransforming {E}ncryption}, + title = {Protocol Misidentification Made Easy with {Format-Transforming Encryption}}, booktitle = {Computer and Communications Security}, year = {2013}, publisher = {ACM}, @@ -623,7 +623,7 @@ @inproceedings{Ensafi2014a, author = {Roya Ensafi and Jeffrey Knockel and Geoffrey Alexander and Jedidiah R. Crandall}, - title = {Detecting Intentional Packet Drops on the {I}nternet via {TCP}/{IP} Side Channels}, + title = {Detecting Intentional Packet Drops on the {Internet} via {TCP/IP} Side Channels}, booktitle = {Passive and Active Measurement Conference}, publisher = {Springer}, year = {2014}, @@ -643,7 +643,7 @@ author = {Nick Feamster and Magdalena Balazinska and Greg Harfst and Hari Balakrishnan and David Karger}, booktitle = {USENIX Security Symposium}, publisher = {USENIX}, - title = {{I}nfranet: Circumventing Web Censorship and Surveillance}, + title = {{Infranet}: Circumventing Web Censorship and Surveillance}, year = {2002}, url = {http://wind.lcs.mit.edu/papers/usenixsec2002.pdf}, } @@ -709,7 +709,7 @@ booktitle = {Computer and Communications Security}, pages = {187--200}, publisher = {ACM}, - title = {{C}irripede: Circumvention Infrastructure using Router Redirection with Plausible Deniability}, + title = {{Cirripede}: Circumvention Infrastructure using Router Redirection with Plausible Deniability}, year = {2011}, url = {http://hatswitch.org/~nikita/papers/cirripede-ccs11.pdf}, } @@ -718,7 +718,7 @@ author = {Amir Houmansadr and Thomas Riedl and Nikita Borisov and Andrew Singer}, booktitle = {Network and Distributed System Security}, publisher = {The Internet Society}, - title = {I want my voice to be heard: {IP} over {V}oice-over-{IP} for unobservable censorship circumvention}, + title = {I want my voice to be heard: {IP} over Voice-over-{IP} for unobservable censorship circumvention}, year = {2013}, url = {http://people.cs.umass.edu/~amir/papers/FreeWave.pdf}, } @@ -744,7 +744,7 @@ @inproceedings{Invernizzi2013a, author = {Luca Invernizzi and Christopher Kruegel and Giovanni Vigna}, booktitle = {Annual Computer Security Applications Conference}, - title = {{M}essage {I}n {A} {B}ottle: Sailing Past Censorship}, + title = {{Message In A Bottle}: Sailing Past Censorship}, publisher = {ACM}, year = {2013}, url = {https://seclab.cs.ucsb.edu/media/uploads/papers/invernizzi_miab_acsac_2013.pdf}, @@ -754,7 +754,7 @@ author = {Ben Jones and Sam Burnett and Nick Feamster and Sean Donovan and Sarthak Grover and Sathya Gunasekaran and Karim Habak}, booktitle = {Free and Open Communications on the Internet}, publisher = {USENIX}, - title = {{F}acade: High-Throughput, Deniable Censorship Circumvention Using Web Search}, + title = {{Facade}: High-Throughput, Deniable Censorship Circumvention Using Web Search}, year = {2014}, url = {https://www.usenix.org/system/files/conference/foci14/foci14_jones-8-8-14.pdf}, } @@ -772,7 +772,7 @@ author = {Josh Karlin and Daniel Ellard and Alden W. Jackson and Christine E. Jones and Greg Lauer and David P. Mankins and W. Timothy Strayer}, booktitle = {Free and Open Communications on the Internet}, publisher = {USENIX}, - title = {Decoy Routing: Toward Unblockable {I}nternet Communication}, + title = {Decoy Routing: Toward Unblockable {Internet} Communication}, year = {2011}, url = {http://static.usenix.org/event/foci11/tech/final_files/Karlin.pdf}, } @@ -781,7 +781,7 @@ author = {Karl Kathuria}, booktitle = {Free and Open Communications on the Internet}, publisher = {USENIX}, - title = {Bypassing {I}nternet Censorship for News Broadcasters}, + title = {Bypassing {Internet} Censorship for News Broadcasters}, year = {2011}, url = {http://static.usenix.org/event/foci11/tech/final_files/Kathuria.pdf}, } @@ -797,7 +797,7 @@ @inproceedings{Khattak2014a, author = {Sheharbano Khattak and Mobin Javed and Syed Ali Khayam and Zartash Afzal Uzmi and Vern Paxson}, - title = {A Look at the Consequences of {I}nternet Censorship Through an {ISP} Lens}, + title = {A Look at the Consequences of {Internet} Censorship Through an {ISP} Lens}, booktitle = {Internet Measurement Conference}, publisher = {ACM}, year = {2014}, @@ -806,7 +806,7 @@ @article{King2014a, author = {Gary King and Jennifer Pan and Margaret E. Roberts}, - title = {Reverse-engineering censorship in {C}hina: Randomized experimentation and participant observation}, + title = {Reverse-engineering censorship in {China}: Randomized experimentation and participant observation}, journal = {Science}, publisher = {AAAS}, year = {2014}, @@ -818,7 +818,7 @@ @article{King2012a, author = {Gary King and Jennifer Pan and Margaret E. Roberts}, journal = {American Political Science Review}, - title = {How Censorship in {C}hina Allows Government Criticism but Silences Collective Expression}, + title = {How Censorship in {China} Allows Government Criticism but Silences Collective Expression}, year = {2012}, url = {http://gking.harvard.edu/files/censored.pdf}, } @@ -827,7 +827,7 @@ author = {Jeffrey Knockel and Jedidiah R. Crandall and Jared Saia}, booktitle = {Free and Open Communications on the Internet}, publisher = {USENIX}, - title = {Three Researchers, Five Conjectures: An Empirical Analysis of {TOM}-{S}kype Censorship and Surveillance}, + title = {Three Researchers, Five Conjectures: An Empirical Analysis of {TOM-Skype} Censorship and Surveillance}, year = {2011}, url = {http://static.usenix.org/event/foci11/tech/final_files/Knockel.pdf}, } @@ -845,7 +845,7 @@ @inproceedings{Li2014a, author = {Shuai Li and Mike Schliep and Nick Hopper}, booktitle = {Workshop on Privacy in the Electronic Society}, - title = {{F}acet: Streaming over Videoconferencing for Censorship Circumvention}, + title = {{Facet}: Streaming over Videoconferencing for Censorship Circumvention}, publisher = {ACM}, year = {2014}, url = {https://www-users.cs.umn.edu/~hopper/facet-wpes14.pdf}, @@ -864,7 +864,7 @@ author = {Zhen Ling and Xinwen Fu and Wei Yu and Junzhou Luo and Ming Yang}, booktitle = {INFOCOM}, publisher = {IEEE}, - title = {Extensive Analysis and Large-Scale Empirical Evaluation of {T}or Bridge Discovery}, + title = {Extensive Analysis and Large-Scale Empirical Evaluation of {Tor} Bridge Discovery}, year = {2012}, url = {http://www.cs.uml.edu/~xinwenfu/paper/Bridge.pdf}, } @@ -873,14 +873,14 @@ author = {Vincent Liu and Seungyeop Han and Arvind Krishnamurthy and Thomas Anderson}, booktitle = {Hot Topics in Networks}, publisher = {ACM}, - title = {{T}or Instead of {IP}}, + title = {{Tor} Instead of {IP}}, year = {2011}, url = {http://conferences.sigcomm.org/hotnets/2011/papers/hotnetsX-final131.pdf}, } @techreport{Lowe2007a, author = {Graham Lowe and Patrick Winters and Michael L. Marcus}, - title = {The Great {DNS} Wall of {C}hina}, + title = {The Great {DNS} Wall of {China}}, institution = {New York University}, year = {2007}, url = {https://cs.nyu.edu/~pcw216/work/nds/final.pdf}, @@ -890,7 +890,7 @@ author = {Daniel Luchaup and Kevin P. Dyer and Somesh Jha and Thomas Ristenpart and Thomas Shrimpton}, booktitle = {USENIX Security Symposium}, publisher = {USENIX}, - title = {{L}ib{FTE}: A Toolkit for Constructing Practical, Format-Abiding Encryption Schemes}, + title = {{LibFTE}: A Toolkit for Constructing Practical, Format-Abiding Encryption Schemes}, year = {2014}, url = {https://www.usenix.org/system/files/conference/usenixsecurity14/sec14-paper-luchaup.pdf}, } @@ -909,14 +909,14 @@ author = {Damon McCoy and Jose Andre Morales and Kirill Levchenko}, booktitle = {Financial Cryptography and Data Security}, publisher = {Springer}, - title = {{P}roximax: A Measurement Based System for Proxies Dissemination}, + title = {{Proximax}: A Measurement Based System for Proxies Dissemination}, year = {2011}, url = {http://cseweb.ucsd.edu/~klevchen/mml-fc11.pdf}, } @inproceedings{Moghaddam2012a, author = {Hooman Mohajeri Moghaddam and Baiyu Li and Mohammad Derakhshani and Ian Goldberg}, - title = {{S}kype{M}orph: Protocol Obfuscation for {T}or Bridges}, + title = {{SkypeMorph}: Protocol Obfuscation for {Tor} Bridges}, booktitle = {Computer and Communications Security}, year = {2012}, publisher = {ACM}, @@ -935,7 +935,7 @@ author = {Zubair Nabi}, booktitle = {Free and Open Communications on the Internet}, publisher = {USENIX}, - title = {The Anatomy of Web Censorship in {P}akistan}, + title = {The Anatomy of Web Censorship in {Pakistan}}, year = {2013}, url = {http://censorbib.nymity.ch/pdf/Nabi2013a.pdf}, } @@ -944,7 +944,7 @@ author = {Daiyuu Nobori and Yasushi Shinjo}, booktitle = {Networked Systems Design and Implementation}, publisher = {USENIX}, - title = {{VPN} {G}ate: A Volunteer-Organized Public {VPN} Relay System with Blocking Resistance for Bypassing Government Censorship Firewalls}, + title = {{VPN Gate}: A Volunteer-Organized Public {VPN} Relay System with Blocking Resistance for Bypassing Government Censorship Firewalls}, year = {2014}, url = {https://www.usenix.org/system/files/conference/nsdi14/nsdi14-paper-nobori.pdf}, } @@ -954,7 +954,7 @@ booktitle = {Distributed Computing Systems}, pages = {315--326}, publisher = {IEEE}, - title = {Empirical Study of a National-Scale Distributed Intrusion Detection System: Backbone-Level Filtering of {HTML} Responses in {C}hina}, + title = {Empirical Study of a National-Scale Distributed Intrusion Detection System: Backbone-Level Filtering of {HTML} Responses in {China}}, year = {2010}, url = {http://www.cs.unm.edu/~crandall/icdcs2010.pdf}, } @@ -973,7 +973,7 @@ author = {Hal Roberts and David Larochelle and Rob Faris and John Palfrey}, booktitle = {Computer Communications Workshop}, publisher = {IEEE}, - title = {Mapping Local {I}nternet Control}, + title = {Mapping Local {Internet} Control}, year = {2011}, url = {https://cyber.law.harvard.edu/netmaps/mlic_20110513.pdf}, } @@ -990,7 +990,7 @@ @inproceedings{Roos2014a, author = {Stefanie Roos and Benjamin Schiller and Stefan Hacker and Thorsten Strufe}, - title = {Measuring {F}reenet in the Wild: Censorship-resilience under Observation}, + title = {Measuring {Freenet} in the Wild: Censorship-resilience under Observation}, booktitle = {Privacy Enhancing Technologies Symposium}, publisher = {Springer}, year = {2014}, @@ -1038,14 +1038,14 @@ author = {Andreas Sfakianakis and Elias Athanasopoulos and Sotiris Ioannidis}, booktitle = {Free and Open Communications on the Internet}, publisher = {USENIX}, - title = {{C}ens{M}on: A Web Censorship Monitor}, + title = {{CensMon}: A Web Censorship Monitor}, year = {2011}, url = {http://static.usenix.org/event/foci11/tech/final_files/Sfakianakis.pdf}, } @inproceedings{Shklovski2011a, author = {Irina Shklovski and Nalini P. Kotamraju}, - title = {Online Contribution Practices in Countries that Engage in {I}nternet Blocking and Censorship}, + title = {Online Contribution Practices in Countries that Engage in {Internet} Blocking and Censorship}, booktitle = {CHI Conference on Human Factors in Computing Systems}, publisher = {ACM}, year = {2011}, @@ -1063,7 +1063,7 @@ @techreport{Stubblefield2001a, author = {Adam Stubblefield and Dan S. Wallach}, - title = {{D}agster: Censorship-Resistant Publishing Without Replication}, + title = {{Dagster}: Censorship-Resistant Publishing Without Replication}, institution = {Rice University}, year = {2001}, url = {http://www.cs.rice.edu/~dwallach/pub/dagster-tr.pdf}, @@ -1109,7 +1109,7 @@ author = {John-Paul Verkamp and Minaxi Gupta}, booktitle = {Free and Open Communications on the Internet}, publisher = {USENIX}, - title = {Five Incidents, One Theme: {T}witter Spam as a Weapon to Drown Voices of Protest}, + title = {Five Incidents, One Theme: {Twitter} Spam as a Weapon to Drown Voices of Protest}, year = {2013}, url = {http://censorbib.nymity.ch/pdf/Verkamp2013a.pdf}, } @@ -1134,7 +1134,7 @@ @inproceedings{Waldman2000a, author = {Marc Waldman and Aviel D. Rubin and Lorrie Faith Cranor}, - title = {{P}ublius: A robust, tamper-evident, censorship-resistant web publishing system}, + title = {{Publius}: A robust, tamper-evident, censorship-resistant web publishing system}, booktitle = {USENIX Security Symposium}, publisher = {USENIX}, year = {2000}, @@ -1143,7 +1143,7 @@ @inproceedings{Waldman2001a, author = {Marc Waldman and David Mazi\`{e}res}, - title = {{T}angler: A Censorship-Resistant Publishing System Based On Document Entanglements}, + title = {{Tangler}: A Censorship-Resistant Publishing System Based On Document Entanglements}, booktitle = {Computer and Communications Security}, publisher = {ACM}, year = {2001}, @@ -1153,7 +1153,7 @@ @inproceedings{Wang2012a, author = {Qiyan Wang and Xun Gong and Giang T. K. Nguyen and Amir Houmansadr and Nikita Borisov}, - title = {{C}ensor{S}poofer: Asymmetric Communication using {IP} Spoofing for Censorship-Resistant Web Browsing}, + title = {{CensorSpoofer}: Asymmetric Communication using {IP} Spoofing for Censorship-Resistant Web Browsing}, booktitle = {Computer and Communications Security}, publisher = {ACM}, year = {2012}, @@ -1162,7 +1162,7 @@ @inproceedings{Wang2013a, author = {Qiyan Wang and Zi Lin and Nikita Borisov and Nicholas J. Hopper}, - title = {r{B}ridge: User Reputation based {T}or Bridge Distribution with Privacy Preservation}, + title = {{rBridge}: User Reputation based {Tor} Bridge Distribution with Privacy Preservation}, booktitle = {Network and Distributed System Security}, publisher = {The Internet Society}, year = {2013}, @@ -1180,7 +1180,7 @@ @inproceedings{Weinberg2012a, author = {Zachary Weinberg and Jeffrey Wang and Vinod Yegneswaran and Linda Briesemeister and Steven Cheung and Frank Wang and Dan Boneh}, - title = {{S}tego{T}orus: A Camouflage Proxy for the {T}or Anonymity System}, + title = {{StegoTorus}: A Camouflage Proxy for the {Tor} Anonymity System}, booktitle = {Computer and Communications Security}, publisher = {ACM}, year = {2012}, @@ -1189,7 +1189,7 @@ @techreport{Wiley2011a, author = {Brandon Wiley}, - title = {{D}ust: A Blocking-Resistant {I}nternet Transport Protocol}, + title = {{Dust}: A Blocking-Resistant {Internet} Transport Protocol}, institution = {University of Texas at Austin}, year = {2011}, url = {http://blanu.net/Dust.pdf}, @@ -1197,7 +1197,7 @@ @inproceedings{Winter2012a, author = {Philipp Winter and Stefan Lindskog}, - title = {How the {G}reat {F}irewall of {C}hina is Blocking {T}or}, + title = {How the {Great Firewall} of {China} is Blocking {Tor}}, booktitle = {Free and Open Communications on the Internet}, publisher = {USENIX}, year = {2012}, @@ -1206,7 +1206,7 @@ @inproceedings{Winter2013a, author = {Philipp Winter}, - title = {Towards a Censorship Analyser for {T}or}, + title = {Towards a Censorship Analyser for {Tor}}, booktitle = {Free and Open Communications on the Internet}, publisher = {USENIX}, year = {2013}, @@ -1215,7 +1215,7 @@ @inproceedings{Winter2013b, author = {Philipp Winter and Tobias Pulls and Juergen Fuss}, - title = {{S}cramble{S}uit: A Polymorphic Network Protocol to Circumvent Censorship}, + title = {{ScrambleSuit}: A Polymorphic Network Protocol to Circumvent Censorship}, booktitle = {Workshop on Privacy in the Electronic Society}, publisher = {ACM}, year = {2013}, @@ -1233,7 +1233,7 @@ @techreport{Wright2012a, author = {Joss Wright}, - title = {Regional Variation in {C}hinese {I}nternet Filtering}, + title = {Regional Variation in {Chinese Internet} Filtering}, institution = {University of Oxford}, year = {2012}, url = {http://papers.ssrn.com/sol3/Delivery.cfm/SSRN_ID2265775_code1448244.pdf?abstractid=2265775&mirid=3}, @@ -1241,7 +1241,7 @@ @inproceedings{Wustrow2011a, author = {Eric Wustrow and Scott Wolchok and Ian Goldberg and J. Alex Halderman}, - title = {{T}elex: Anticensorship in the Network Infrastructure}, + title = {{Telex}: Anticensorship in the Network Infrastructure}, booktitle = {USENIX Security Symposium}, publisher = {USENIX}, year = {2011}, @@ -1250,7 +1250,7 @@ @inproceedings{Wustrow2014a, author = {Eric Wustrow and Colleen M. Swanson and J. Alex Halderman}, - title = {{T}ap{D}ance: End-to-Middle Anticensorship without Flow Blocking}, + title = {{TapDance}: End-to-Middle Anticensorship without Flow Blocking}, booktitle = {USENIX Security Symposium}, publisher = {USENIX}, year = {2014}, @@ -1259,7 +1259,7 @@ @inproceedings{Xu2011a, author = {Xueyang Xu and Z. Morley Mao and J. Alex Halderman}, - title = {{I}nternet Censorship in {C}hina: Where Does the Filtering Occur?}, + title = {{Internet} Censorship in {China}: Where Does the Filtering Occur?}, booktitle = {Passive and Active Measurement Conference}, publisher = {Springer}, year = {2011},