Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,741,303 papers from all fields of science
Search
Sign In
Create Free Account
Internet censorship circumvention
Known as:
Censorship circumvention
, Circumvention of internet censorship
Internet censorship circumvention describes various processes used by Internet users to bypass the technical aspects of Internet filtering and gain…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
31 relations
Archive site
Avast SecureLine
Bloglines
CGIProxy
Expand
Broader (1)
Internet security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Exploring the Design Space of Longitudinal Censorship Measurement Platforms
Abbas Razaghpanah
,
Anke Li
,
+4 authors
Phillipa Gill
arXiv.org
2016
Corpus ID: 15783936
Despite the high perceived value and increasing severity of online information controls, a data-driven understanding of the…
Expand
2016
2016
DeltaShaper – Video Stream Synthesis for Internet Censorship Circumvention
Diogo Barradas
,
Diogo Barradas
2016
Corpus ID: 18219701
Citizens living in countries ruled by repressive regimes may have access to rightful information blocked or may be prevented from…
Expand
2015
2015
Tor’s Usability for Censorship Circumvention
D. Fifield
,
L. Lee
,
Serge Egelman
,
David Wagner
2015
Corpus ID: 16873357
Tor has grown beyond its original purpose as and has since become an important Internet circumvention tool. We specifically…
Expand
2014
2014
TRIST: Circumventing Censorship with Transcoding-Resistant Image Steganography
Christopher I. Connolly
,
P. Lincoln
,
Ian A. Mason
,
V. Yegneswaran
IEEE Symposium on Foundations of Computational…
2014
Corpus ID: 8273156
We explore the viability of extending state-of-the-art image steganography techniques for bypassing censorship. Our quest for a…
Expand
2013
2013
SkypeMorph: Protocol Obfuscation for Censorship Resistance
H. M. Moghaddam
2013
Corpus ID: 38376305
The Tor network is designed to provide users with low-latency anonymous communication. Tor clients build circuits with publicly…
Expand
2013
2013
Freeweb: P2P-Assisted Collaborative Censorship-Resistant Web Browsing
Haiying Shen
,
A. Liu
,
Guoxin Liu
,
Lianyu Zhao
IEEE Transactions on Parallel and Distributed…
2013
Corpus ID: 830214
In many countries, the Internet is under stringent censorship for political or religious reasons which severely undermines the…
Expand
2012
2012
A Taxonomy of Internet Censorship Resistance Strategies
T. Elahi
,
I. Goldberg
2012
Corpus ID: 17002867
We present a taxonomy of Internet censorship resistance strategies and techniques extracted from analyzing proposed and…
Expand
2009
2009
Flatland Photonics: Circumventing Diffraction with Planar Plasmonic Architectures
J. Dionne
2009
Corpus ID: 135512540
On subwavelength scales, photon-matter interactions are limited by diffraction. The diffraction limit restricts the size of…
Expand
2006
2006
Examining the constitutionality of Internet filtering in public schools: a US perspective
R. Hall
,
Edward L. Carter
2006
Corpus ID: 145557086
The use of Internet filters in public classrooms in the USA has been intensely debated, both in terms of its effectiveness and…
Expand
2001
2001
Recovery in fault-tolerant distributed microcontrollers
D. Rennels
,
R. Hwang
International Conference on Dependable Systems…
2001
Corpus ID: 37685435
The paper describes the use of fault tolerance in a microcontroller node to be used in a network of embedded processors. It is…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE