JOURNAL BROWSE
Search
Advanced SearchSearch Tips
Anti-Censorship and Anonymous Web-Browsing System
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
 Title & Authors
Anti-Censorship and Anonymous Web-Browsing System
Lee, Eunsu; Lee, Suk-bok;
  PDF(new window)
 Abstract
Internet censorship-circumvention and anonymizing services are becoming important with an increase in Internet population. Existing circumvention/anonymizing systems, however, have their own limitations, and they mainly suffer from the shortage of volunteers who relay others' traffic to bypass censors. In this paper, we present a new way of achieving censorship-circumvention while guaranteeing anonymity through the cooperation between censored and uncensored users.
 Keywords
Anti-censorship;anonymity;
 Language
Korean
 Cited by
 References
1.
S. Kelly, M. Earp, L. Reed, A. Shahbaz, and M. Truong. Freedom on the Net 2014. Freedom House, pp. 1-22. 2014, December.

2.
Tor Porject: Anonymity Online, https://www.torproject.org

3.
M. Graham, S.D. Sabbath. The anonymous Internet. Information Geographies at the Oxford Internet Institute, 2014

4.
P Winter, S Lindskog. How the great firewall of china is blocking tor. USENIX FOCI, pp. 1-9, Bellevue, WA.2012, August.

5.
VPN Gate, http://www.vpngate.net/en/

6.
ZenMate, https:/zenmate.com

7.
H. M. Moghaddam, B. Li, M. Derakshani, and I. Goldberg. SkypeMorph: Protocol obfuscation for Tor bridges. ACM CCS, pp. 97-108. NC, USA. 2012, October.

8.
A. Houmansadr, T. Riedl, N. Borisov, and A. Singer. I want my voice to be heard: IP over Voice-over-IP for unobservable censorship circumvention. NDSS Symposium. San Diego, CA United States. 2013, February.

9.
Q. Wang et al. Censorspoofer: Asymmetric communication using IP spoofing for censorship-resistant web browsing. ACM CCS, pp. 121-132. NC, USA. 2012, October.

10.
J. Geddes, M. Schuchard, and N. Hopper. Cover your ACKs: Pitfalls of covert channel censorship circumvention. ACM CCS, pp. 361-372. Berlin, Germany, 2013, November.

11.
E. Wustrow, S. Wolchok, I. Goldberg, and J. A. Halderman. Telex: Anticensorship in the network infrastructure. USENIX Security Symposium. San Francisco, CA. 2011, August.

12.
J. Karlin et al. Decoy routing: Toward unblockable Internet communication. USENIX FOCI. San Francisco, CA. 2011, August.

13.
A. Houmansadr et al. Cirripede: Circumvention infrastructure using router redirection with plausible deniability. ACM CCS, pp. 187-200. Chicago, IL. 2011, October.

14.
E. Androulaki, M. Raykova, S. Srivatsan, A. Stavrou, and S. M. Bellovin. PAR: Payment for anonymous routing. PETS, pp. 219-236. Leuven, Belgium. 2008, July.

15.
R. Jansen, A. Johnson, and P. Syverson. LIRA: Lightweight incentivized routing for anonymity. NDSS Symposium. San Diego, CA United States. 2013, February.

16.
R. Jansen et al. Recruiting new Tor relays with BRAIDS. ACM CCS, pp. 319-328. Chicago, IL. 2010, October.

17.
The CMAND Spoofer project. http://spoofer.cmand.org.