Internet censorship circumvention

Known as: Censorship circumvention, Circumvention of internet censorship 
Internet censorship circumvention describes various processes used by Internet users to bypass the technical aspects of Internet filtering and gain… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Repressive regimes are known to deploy large-scale surveillance and censorship mechanisms in order to deter their citizens from… (More)
  • figure 2.1
  • figure 2.2
  • figure 2.3
  • figure 2.4
  • table 2.1
Is this relevant?
2016
2016
Citizens living in countries ruled by repressive regimes may have access to rightful information blocked or may be prevented from… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
2014
2014
Censorship circumvention systems that use HTTP as cover traffic make tradeoffs between deniability and performance by offering… (More)
Is this relevant?
2014
2014
Censorship circumvention systems such as Tor are highly vulnerable to network-level filtering. Because the traffic generated by… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
2014
2014
In this paper, we introduce Facet, an unobservable transport service for social video sites. Facet evades detection by Internet… (More)
  • figure 1
  • figure 2
  • table 1
  • figure 5
  • figure 4
Is this relevant?
2013
2013
In response to increasingly sophisticated methods of blocking access to censorship circumvention schemes such as Tor, recently… (More)
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2013
2013
We introduce the concept of a web-based online scanning service, or OSS for short, and show that these OSSes can be covertly used… (More)
  • figure 1
  • figure 2
  • table 1
  • table 2
  • table 3
Is this relevant?
Highly Cited
2013
Highly Cited
2013
The Iranian government operates one of the largest and most sophisticated Internet censorship regimes in the world, but the… (More)
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2013
Highly Cited
2013
Open communication over the Internet poses a serious threat to countries with repressive regimes, leading them to develop and… (More)
  • table I
Is this relevant?
2012
2012
Using an organizational informatics approach, this study explores the implications of human rights organizations’ use of… (More)
  • table 1
  • figure 1
  • table 2
  • table 3
  • figure 2
Is this relevant?