mirror of
https://github.com/NullHypothesis/censorbib.git
synced 2025-07-23 14:41:07 -04:00
Add two WPES'15 papers.
This commit is contained in:
parent
071dc6e0d6
commit
ff11e87a52
3 changed files with 23 additions and 1 deletions
|
@ -1,3 +1,7 @@
|
|||
* 2015-11-05
|
||||
- Added paper ``Rook: Using Video Games as a Low-Bandwidth Censorship Resistant Communication Platform''
|
||||
- Added paper ``Known Unknowns: An Analysis of Twitter Censorship in Turkey''
|
||||
|
||||
* 2015-10-30
|
||||
- Added paper ``Examining How the {G}reat {F}irewall Discovers Hidden Circumvention Servers''
|
||||
|
||||
|
|
|
@ -73,7 +73,7 @@
|
|||
(<a href="author_reverse.html">reverse</a>) <a href="author.html">author</a> <br />
|
||||
Feedback: <a href="mailto:phw@nymity.ch">phw@nymity.ch</a> (<a
|
||||
href="https://nymity.ch/openpgp_public_key.txt">OpenPGP</a>) <br />
|
||||
Last updated: <a href="Changelog.txt">2015-10-30</a> <br />
|
||||
Last updated: <a href="Changelog.txt">2015-11-05</a> <br />
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
|
|
|
@ -1,3 +1,21 @@
|
|||
@inproceedings{Vines2015a,
|
||||
author = {Paul Vines and Tadayoshi Kohno},
|
||||
title = {{R}ook: Using Video Games as a Low-Bandwidth Censorship Resistant Communication Platform},
|
||||
booktitle = {Workshop on Privacy in the Electronic Society},
|
||||
publisher = {ACM},
|
||||
year = {2015},
|
||||
url = {http://censorbib.nymity.ch/pdf/Vines2015a.pdf},
|
||||
}
|
||||
|
||||
@inproceedings{Tanash2015a,
|
||||
author = {Rima S. Tanash and Zhouhan Chen and Tanmay Thakur and Dan S. Wallach and Devika Subramanian},
|
||||
title = {Known Unknowns: An Analysis of {T}witter Censorship in {T}urkey},
|
||||
booktitle = {Workshop on Privacy in the Electronic Society},
|
||||
publisher = {ACM},
|
||||
year = {2015},
|
||||
url = {http://censorbib.nymity.ch/pdf/Tanash2015a.pdf},
|
||||
}
|
||||
|
||||
@inproceedings{Ensafi2015b,
|
||||
author = {Roya Ensafi and David Fifield and Philipp Winter and Nick Feamster and Nicholas Weaver and Vern Paxson},
|
||||
title = {Examining How the {G}reat {F}irewall Discovers Hidden Circumvention Servers},
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue