diff --git a/img/bibtex-icon.svg b/assets/bibtex-icon.svg
similarity index 100%
rename from img/bibtex-icon.svg
rename to assets/bibtex-icon.svg
diff --git a/img/cache-icon.svg b/assets/cache-icon.svg
similarity index 100%
rename from img/cache-icon.svg
rename to assets/cache-icon.svg
diff --git a/img/code-icon.svg b/assets/code-icon.svg
similarity index 100%
rename from img/code-icon.svg
rename to assets/code-icon.svg
diff --git a/img/link-icon.svg b/assets/link-icon.svg
similarity index 100%
rename from img/link-icon.svg
rename to assets/link-icon.svg
diff --git a/img/pdf-icon.svg b/assets/pdf-icon.svg
similarity index 100%
rename from img/pdf-icon.svg
rename to assets/pdf-icon.svg
diff --git a/img/research-power-tools-cover.jpg b/assets/research-power-tools-cover.jpg
similarity index 100%
rename from img/research-power-tools-cover.jpg
rename to assets/research-power-tools-cover.jpg
diff --git a/img/update-icon.svg b/assets/update-icon.svg
similarity index 100%
rename from img/update-icon.svg
rename to assets/update-icon.svg
diff --git a/img/author-icon.svg b/img/author-icon.svg
deleted file mode 100644
index d3b0a1f..0000000
--- a/img/author-icon.svg
+++ /dev/null
@@ -1 +0,0 @@
-
\ No newline at end of file
diff --git a/img/author-reverse-icon.svg b/img/author-reverse-icon.svg
deleted file mode 100644
index 8321cc9..0000000
--- a/img/author-reverse-icon.svg
+++ /dev/null
@@ -1 +0,0 @@
-
\ No newline at end of file
diff --git a/img/donate-icon.svg b/img/donate-icon.svg
deleted file mode 100644
index e13015b..0000000
--- a/img/donate-icon.svg
+++ /dev/null
@@ -1 +0,0 @@
-
\ No newline at end of file
diff --git a/img/file-icon.svg b/img/file-icon.svg
deleted file mode 100644
index c581e8f..0000000
--- a/img/file-icon.svg
+++ /dev/null
@@ -1 +0,0 @@
-
\ No newline at end of file
diff --git a/img/lock-icon.svg b/img/lock-icon.svg
deleted file mode 100644
index 19dfa22..0000000
--- a/img/lock-icon.svg
+++ /dev/null
@@ -1 +0,0 @@
-
\ No newline at end of file
diff --git a/img/year-icon.svg b/img/year-icon.svg
deleted file mode 100644
index 565af50..0000000
--- a/img/year-icon.svg
+++ /dev/null
@@ -1 +0,0 @@
-
\ No newline at end of file
diff --git a/img/year-reverse-icon.svg b/img/year-reverse-icon.svg
deleted file mode 100644
index 71dbcdd..0000000
--- a/img/year-reverse-icon.svg
+++ /dev/null
@@ -1 +0,0 @@
-
\ No newline at end of file
diff --git a/index.html b/index.html
index 286c83d..6dc57f8 100644
--- a/index.html
+++ b/index.html
@@ -29,12 +29,9 @@
ul {
border-radius: 10px;
border:1px solid #c0c0c0;
- background: #efefef;
+ background: #f5f5f5;
box-shadow: 2px 2px 5px #bbb;
}
- ul.a {
- list-style-image: url('donate-icon.svg');
- }
a:link {
color:#0b61a4;
text-decoration:none;
@@ -91,7 +88,7 @@
}
#left-header {
flex: 4;
- background: #efefef;
+ background: #f5f5f5;
margin-right: 0.5em;
border-radius: 10px;
border: 1px solid #c0c0c0;
@@ -100,9 +97,9 @@
}
#right-header {
flex: 1;
- background: #efefef;
+ background: #f5f5f5;
margin-left: 0.5em;
- background: #333 url('img/research-power-tools-cover.jpg') no-repeat;
+ background: #333 url('assets/research-power-tools-cover.jpg') no-repeat;
background-size: 100%;
}
.round-shadow {
@@ -165,12 +162,9 @@
systems, or by measuring how censorship works. The icons next to each
paper make it easy to download, cite, and link to papers. If you think
I missed a paper,
- let me know.
- You can sort papers by
- year,
- reverse year (default),
- author, and
- reverse author.
+
+ make a pull request
+ .
Finally, the
net4people/bbs forum
has reading groups for many of the papers listed below.
@@ -178,20 +172,12 @@
@@ -6688,16 +6699,16 @@ Whiskey, Weed, and Wukan on the World Wide Web: On Measuring Censors’ Resource
-
+
-
-
+
+
-
-
+
+
-
+
@@ -6716,16 +6727,16 @@ The Hidden Internet of Iran: Private Address Allocations on a National Network
-
+
-
-
+
+
-
-
+
+
-
+
@@ -6744,16 +6755,16 @@ The Collateral Damage of Internet Censorship by DNS Injection
-
+
-
-
+
+
-
-
+
+
-
+
@@ -6772,16 +6783,16 @@ Hold-On: Protecting Against On-Path DNS Poisoning
-
+
-
-
+
+
-
-
+
+
-
+
@@ -6800,16 +6811,16 @@ Evading Censorship with Browser-Based Proxies
-
+
-
-
+
+
-
-
+
+
-
+
@@ -6828,16 +6839,16 @@ OONI: Open Observatory of Network Interference
-
+
-
-
+
+
-
-
+
+
-
+
@@ -6856,16 +6867,16 @@ How Censorship in China Allows Government Criticism but Silences Collective Expr
-
+
-
-
+
+
-
-
+
+
-
+
@@ -6884,16 +6895,16 @@ Bootstrapping Communications into an Anti-Censorship System
-
+
-
-
+
+
-
-
+
+
-
+
@@ -6912,16 +6923,16 @@ Extensive Analysis and Large-Scale Empirical Evaluation of Tor Bridge Discovery
-
+
-
-
+
+
-
-
+
+
-
+
@@ -6940,16 +6951,16 @@ SkypeMorph: Protocol Obfuscation for Tor Bridges
-
+
-
-
+
+
-
-
+
+
-
+
@@ -6968,16 +6979,16 @@ Secure Communication over Diverse Transports
-
+
-
-
+
+
-
-
+
+
-
+
@@ -6996,16 +7007,16 @@ Routing Around Decoys
-
+
-
-
+
+
-
-
+
+
-
+
@@ -7024,16 +7035,16 @@ Adapting Social Spam Infrastructure for Political Censorship
-
+
-
-
+
+
-
-
+
+
-
+
@@ -7052,16 +7063,16 @@ One-way indexing for plausible deniability in censorship resistant storage
-
+
-
-
+
+
-
-
+
+
-
+
@@ -7080,16 +7091,16 @@ Inferring Mechanics of Web Censorship Around the World
-
+
-
-
+
+
-
-
+
+
-
+
@@ -7108,16 +7119,16 @@ CensorSpoofer: Asymmetric Communication using IP Spoofing for Censorship-Resista
-
+
-
-
+
+
-
-
+
+
-
+
@@ -7136,16 +7147,16 @@ StegoTorus: A Camouflage Proxy for the Tor Anonymity System
-
+
-
-
+
+
-
-
+
+
-
+
@@ -7164,16 +7175,16 @@ How the Great Firewall of China is Blocking Tor
-
+
-
-
+
+
-
-
+
+
-
+
@@ -7192,16 +7203,16 @@ Regional Variation in Chinese Internet Filtering
-
+
-
-
+
+
-
-
+
+
-
+
@@ -7213,23 +7224,25 @@ Joss Wright
2012
-
+
+
+
BridgeSPA: Improving Tor Bridges with Single Packet Authorization
-
+
-
-
+
+
-
-
+
+
-
+
@@ -7248,16 +7261,16 @@ Hiding Amongst the Clouds: A Proposal for Cloud-based Onion Routing
-
+
-
-
+
+
-
-
+
+
-
+
@@ -7276,16 +7289,16 @@ In Proc. of: Free and Open Communications on the Internet
-
+
-
-
+
+
-
-
+
+
-
+
@@ -7304,16 +7317,16 @@ Scrambling for lightweight censorship resistance
-
+
-
-
+
+
-
-
+
+
-
+
@@ -7332,16 +7345,16 @@ Analysis of Country-wide Internet Outages Caused by Censorship
-
+
-
-
+
+
-
-
+
+
-
+
@@ -7360,16 +7373,16 @@ An anomaly-based censorship-detection system for Tor
-
+
-
-
+
+
-
-
+
+
-
+
@@ -7388,16 +7401,16 @@ Automated Named Entity Extraction for Tracking Censorship of Current Events
-
+
-
-
+
+
-
-
+
+
-
+
@@ -7416,16 +7429,16 @@ Cirripede: Circumvention Infrastructure using Router Redirection with Plausible
-
+
-
-
+
+
-
-
+
+
-
+
@@ -7444,16 +7457,16 @@ Decoy Routing: Toward Unblockable Internet Communication
-
+
-
-
+
+
-
-
+
+
-
+
@@ -7472,16 +7485,16 @@ Bypassing Internet Censorship for News Broadcasters
-
+
-
-
+
+
-
-
+
+
-
+
@@ -7500,16 +7513,16 @@ Three Researchers, Five Conjectures: An Empirical Analysis of TOM-Skype Censorsh
-
+
-
-
+
+
-
-
+
+
-
+
@@ -7528,16 +7541,16 @@ Tor Instead of IP
-
+
-
-
+
+
-
-
+
+
-
+
@@ -7556,16 +7569,16 @@ Proximax: A Measurement Based System for Proxies Dissemination
-
+
-
-
+
+
-
-
+
+
-
+
@@ -7584,16 +7597,16 @@ Mapping Local Internet Control
-
+
-
-
+
+
-
-
+
+
-
+
@@ -7612,16 +7625,16 @@ Infrastructures of Censorship and Lessons from Copyright Resistance
-
+
-
-
+
+
-
-
+
+
-
+
@@ -7640,16 +7653,16 @@ CensMon: A Web Censorship Monitor
-
+
-
-
+
+
-
-
+
+
-
+
@@ -7668,16 +7681,16 @@ Online Contribution Practices in Countries that Engage in Internet Blocking and
-
+
-
-
+
+
-
-
+
+
-
+
@@ -7696,16 +7709,16 @@ Dust: A Blocking-Resistant Internet Transport Protocol
-
+
-
-
+
+
-
-
+
+
-
+
@@ -7724,16 +7737,16 @@ Fine-Grained Censorship Mapping: Information Sources, Legality and Ethics
-
+
-
-
+
+
-
-
+
+
-
+
@@ -7752,16 +7765,16 @@ Telex: Anticensorship in the Network Infrastructure
-
+
-
-
+
+
-
-
+
+
-
+
@@ -7780,16 +7793,16 @@ Internet Censorship in China: Where Does the Filtering Occur?
-
+
-
-
+
+
-
-
+
+
-
+
@@ -7801,23 +7814,25 @@ Xueyang Xu, Z. Morley Mao, J. Alex Halderman
In Proc. of: Passive and Active Measurement Conference, 2011, Springer
-
+
+
+
A terminology for talking about privacy by data minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management
-
+
-
-
+
+
-
-
+
+
-
+
@@ -7836,16 +7851,16 @@ Chipping Away at Censorship Firewalls with User-Generated Content
-
+
-
-
+
+
-
-
+
+
-
+
@@ -7864,16 +7879,16 @@ Fighting Censorship with Algorithms
-
+
-
-
+
+
-
-
+
+
-
+
@@ -7892,16 +7907,16 @@ Empirical Study of a National-Scale Distributed Intrusion Detection System: Back
-
+
-
-
+
+
-
-
+
+
-
+
@@ -7913,23 +7928,25 @@ Jong Chun Park, Jedidiah R. Crandall
In Proc. of: Distributed Computing Systems, 2010, IEEE
-
+
+
+
On the risks of serving whenever you surf: Vulnerabilities in Tor’s blocking resistance design
-
+
-
-
+
+
-
-
+
+
-
+
@@ -7948,16 +7965,16 @@ Anonymity and Censorship Resistance in Unstructured Overlay Networks
-
+
-
-
+
+
-
-
+
+
-
+
@@ -7976,16 +7993,16 @@ SkyF2F: Censorship Resistant via Skype Overlay Network
-
+
-
-
+
+
-
-
+
+
-
+
@@ -8004,16 +8021,16 @@ Detecting Forged TCP Reset Packets
-
+
-
-
+
+
-
-
+
+
-
+
@@ -8025,23 +8042,25 @@ Nicholas Weaver, Robin Sommer, Vern Paxson
In Proc. of: Network and Distributed System Security, 2009, The Internet Society
-
@@ -8060,16 +8079,16 @@ Pass it on: Social Networks Stymie Censors
-
+
-
-
+
+
-
-
+
+
-
+
@@ -8081,23 +8100,25 @@ Yair Sovran, Alana Libonati, Jinyang Li
In Proc. of: International Workshop on Peer-to-Peer Systems, 2008, USENIX
-
+
+
+
ConceptDoppler: A Weather Tracker for Internet Censorship
-
+
-
-
+
+
-
-
+
+
-
+
@@ -8116,16 +8137,16 @@ The Great DNS Wall of China
-
+
-
-
+
+
-
-
+
+
-
+
@@ -8137,23 +8158,25 @@ Graham Lowe, Patrick Winters, Michael L. Marcus
2007
-
@@ -8312,16 +8339,16 @@ How to Achieve Blocking Resistance for Existing Systems Enabling Anonymous Web S
-
+
-
-
+
+
-
-
+
+
-
+
@@ -8333,23 +8360,25 @@ Stefan Köpsell, Ulf Hillig
In Proc. of: Workshop on Privacy in the Electronic Society, 2004, ACM
-
@@ -8480,16 +8513,16 @@ Tangler: A Censorship-Resistant Publishing System Based On Document Entanglement
-
+
-
-
+
+
-
-
+
+
-
+
@@ -8501,23 +8534,25 @@ Marc Waldman, David Mazières
In Proc. of: Computer and Communications Security, 2001, ACM
-
+
+
+
Publius: A robust, tamper-evident, censorship-resistant web publishing system
-
+
-
-
+
+
-
-
+
+
-
+
@@ -8529,23 +8564,25 @@ Marc Waldman, Aviel D. Rubin, Lorrie Faith Cranor
In Proc. of: USENIX Security Symposium, 2000, USENIX
-