Blind matching algorithm based proxy distribution against internet censorship
Abstract Proxy based censorship circumvention technique is treated as one of the most promising approaches to fighting against Internet censorship, and its practical applications like the onion router and Lantern have been widely utilized. However, the proxy distribution, as a basic and core issue,...
| Published in: | IET Communications |
|---|---|
| Main Authors: | Xin Shi, Yunfei Guo, Hongchao Hu, Yawen Wang, Zhen Gao, Xiaoli Sun |
| Format: | Article |
| Language: | English |
| Published: |
Wiley
2023-04-01
|
| Subjects: | |
| Online Access: | https://doi.org/10.1049/cmu2.12589 |
Similar Items
SymBiosis: Anti-Censorship and Anonymous Web-Browsing Ecosystem
by: Hyunwoo Yu, et al.
Published: (2016-01-01)
by: Hyunwoo Yu, et al.
Published: (2016-01-01)
Internet Censorship Circumvention Tools: Escaping the Control of the Syrian Regime
by: Walid Al-Saqaf
Published: (2016-02-01)
by: Walid Al-Saqaf
Published: (2016-02-01)
La netnographie d’une communauté en ligne en lutte contre la « censure » sur un forum français populaire
by: Olivier PERIA
Published: (2024-11-01)
by: Olivier PERIA
Published: (2024-11-01)
Privacy matching-based service proxy discovery scheme
by: Kui GENG, et al.
Published: (2016-08-01)
by: Kui GENG, et al.
Published: (2016-08-01)
Privacy matching-based service proxy discovery scheme
by: Kui GENG, et al.
Published: (2016-08-01)
by: Kui GENG, et al.
Published: (2016-08-01)
Susciter un changement politique à Cuba par le numérique : le projet ZunZuneo de l’USAID
by: Tristan MATTELART
Published: (2024-11-01)
by: Tristan MATTELART
Published: (2024-11-01)
Post-Quantum Secure Identity-Based Proxy Blind Signature Scheme on a Lattice
by: Fengyin Li, et al.
Published: (2023-08-01)
by: Fengyin Li, et al.
Published: (2023-08-01)
Two Quantum Proxy Blind Signature Schemes Based on Controlled Quantum Teleportation
by: Qiming Luo, et al.
Published: (2022-10-01)
by: Qiming Luo, et al.
Published: (2022-10-01)
Provably secure certificate less blind proxy re-signatures
by: Tao FENG, et al.
Published: (2012-09-01)
by: Tao FENG, et al.
Published: (2012-09-01)
Provably secure certificate less blind proxy re-signatures
by: Tao FENG, et al.
Published: (2012-09-01)
by: Tao FENG, et al.
Published: (2012-09-01)
THE URGENCY OF ANTI-CIRCUMVENTION ARRANGEMENTS IN INDONESIA: A COMPARATIVE ANALYSIS WITH THE UNITED STATES AND ISLAMIC LAW PERSPECTIVES
by: Adi Prasetyo, et al.
Published: (2025-06-01)
by: Adi Prasetyo, et al.
Published: (2025-06-01)
Partially blind proxy re-signature scheme with proven security
by: Xiaodong YANG, et al.
Published: (2018-02-01)
by: Xiaodong YANG, et al.
Published: (2018-02-01)
Partially blind proxy re-signature scheme with proven security
by: Xiaodong YANG, et al.
Published: (2018-02-01)
by: Xiaodong YANG, et al.
Published: (2018-02-01)
Internet Freedom in Asia: Case of Internet Censorship in China
by: ZAINUDDIN MUDA Z. MONGGILO
Published: (2016-02-01)
by: ZAINUDDIN MUDA Z. MONGGILO
Published: (2016-02-01)
Privacy Protection Scheme Based on Proxy Blind Signcryption in Smart Grid
by: WANG Yicheng, GUO Rui, MENG Tong, LIU Yingfei
Published: (2023-05-01)
by: WANG Yicheng, GUO Rui, MENG Tong, LIU Yingfei
Published: (2023-05-01)
Internet censorship in Turkey
by: Mustafa Akgül, et al.
Published: (2015-06-01)
by: Mustafa Akgül, et al.
Published: (2015-06-01)
Internet censorship: a study of blocking software applications in libraries
by: Nermeen Abdelqader
Published: (2004-06-01)
by: Nermeen Abdelqader
Published: (2004-06-01)
Fractured Reservoirs History Matching based on Proxy Model and Intelligent Optimization Algorithms
by: Sayyed Hadi Riazi, et al.
Published: (2016-06-01)
by: Sayyed Hadi Riazi, et al.
Published: (2016-06-01)
Fractured Reservoirs History Matching based on Proxy Model and Intelligent Optimization Algorithms
by: Sayyed Hadi Riazi, et al.
Published: (2016-06-01)
by: Sayyed Hadi Riazi, et al.
Published: (2016-06-01)
Censorship of the application of Companies Governance Rules -Comparative study-
by: Rian Othman
Published: (2021-03-01)
by: Rian Othman
Published: (2021-03-01)
Partially Blind Proxy Re-Signature Scheme Without Bilinear Pairing
by: NIU Shufen, LI Wenting, WANG Caifen
Published: (2020-05-01)
by: NIU Shufen, LI Wenting, WANG Caifen
Published: (2020-05-01)
Censorship in People’s Poland
by: Grzegorz Łęcicki
Published: (2017-05-01)
by: Grzegorz Łęcicki
Published: (2017-05-01)
Censorship and Self-Censorship in Interwar and Soviet-Era Translations from French Into Lithuanian
by: Leonavičienė Aurelija
Published: (2025-06-01)
by: Leonavičienė Aurelija
Published: (2025-06-01)
Novel and Censorship or Eros’ Bad Fait h
by: Maurice Couturier
Published: (2013-11-01)
by: Maurice Couturier
Published: (2013-11-01)
Self-censorship in Massimo Bontempelli’s Magical Realism
by: Wissia Fiorucci
Published: (2015-05-01)
by: Wissia Fiorucci
Published: (2015-05-01)
“A War Between Buffoons”? Censorship and Self-Censorship in Postcolonial Literature
by: Lorenzo Mari
Published: (2015-05-01)
by: Lorenzo Mari
Published: (2015-05-01)
The ethics of DeCSS posting: towards assessing the morality of the Internet posting of DVD copyright circumvention software
by: K.R. Eschenfelder, et al.
Published: (2006-01-01)
by: K.R. Eschenfelder, et al.
Published: (2006-01-01)
Testing the INSIM-FT Proxy Simulation Method
by: Mkhitar Ovsepian, et al.
Published: (2023-02-01)
by: Mkhitar Ovsepian, et al.
Published: (2023-02-01)
Internet Censorship in Iran: An Inside Look
by: Alireza Hashemzadegan, et al.
Published: (2022-07-01)
by: Alireza Hashemzadegan, et al.
Published: (2022-07-01)
Gaussian Processes Proxy Model with Latent Variable Models and Variogram-Based Sensitivity Analysis for Assisted History Matching
by: Dongmei Zhang, et al.
Published: (2020-08-01)
by: Dongmei Zhang, et al.
Published: (2020-08-01)
Internet Censorship in Arab Countries: Religious and Moral Aspects
by: Alisa Shishkina, et al.
Published: (2018-11-01)
by: Alisa Shishkina, et al.
Published: (2018-11-01)
Le regard panoptique et l’art surveillance : esthétique et politique du contournement
by: Mehdi GHASSEMI, et al.
Published: (2024-11-01)
by: Mehdi GHASSEMI, et al.
Published: (2024-11-01)
Design and implementation of proxy-protected proxy signature based on SM2
by: Qing-xiao GUO, et al.
Published: (2017-09-01)
by: Qing-xiao GUO, et al.
Published: (2017-09-01)
Design and implementation of proxy-protected proxy signature based on SM2
by: Qing-xiao GUO,Da-wei ZHANG,Jing-wen SONG, et al.
Published: (2017-09-01)
by: Qing-xiao GUO,Da-wei ZHANG,Jing-wen SONG, et al.
Published: (2017-09-01)
Censorship
by: José Edil Guimarães de Medeiros
Published: (2024-02-01)
by: José Edil Guimarães de Medeiros
Published: (2024-02-01)
Proxy Re-signature Schemes : Multi-use, Unidirectional & Translations
by: N.R. Sunitha, et al.
Published: (2011-08-01)
by: N.R. Sunitha, et al.
Published: (2011-08-01)
Obscene and Perverse Fictions: Saadat Hasan Manto and Censorship
by: Monalisa Jha
Published: (2024-07-01)
by: Monalisa Jha
Published: (2024-07-01)
Institutional Censorship of Academic Humanities Publishing in Communist Poland. Preliminary Findings and Research Perspectives
by: Kamila Budrowska
Published: (2025-09-01)
by: Kamila Budrowska
Published: (2025-09-01)
Beckett, Censorship and the Problem of Parody
by: Seán Kennedy
Published: (2019-10-01)
by: Seán Kennedy
Published: (2019-10-01)
Censorship and Magic Tricks in Inter-War Britain
by: Lisa Z. Sigel
Published: (2013-05-01)
by: Lisa Z. Sigel
Published: (2013-05-01)
Similar Items
-
SymBiosis: Anti-Censorship and Anonymous Web-Browsing Ecosystem
by: Hyunwoo Yu, et al.
Published: (2016-01-01) -
Internet Censorship Circumvention Tools: Escaping the Control of the Syrian Regime
by: Walid Al-Saqaf
Published: (2016-02-01) -
La netnographie d’une communauté en ligne en lutte contre la « censure » sur un forum français populaire
by: Olivier PERIA
Published: (2024-11-01) -
Privacy matching-based service proxy discovery scheme
by: Kui GENG, et al.
Published: (2016-08-01) -
Privacy matching-based service proxy discovery scheme
by: Kui GENG, et al.
Published: (2016-08-01)
