Cited By
View all- Zillien SSchmidbauer TKubek MKeller JWendzel SQuek TGao DZhou JCardenas A(2024)Look What’s There! Utilizing the Internet’s Existing Data for Censorship Circumvention with OPPRESSIONProceedings of the 19th ACM Asia Conference on Computer and Communications Security10.1145/3634737.3637676(80-95)Online publication date: 1-Jul-2024
- Umayya ZMalik DGosain DKumar Sharma PMontpetit MLeivadeas AUhlig SJaved M(2023)PTPerf: On the Performance Evaluation of Tor Pluggable TransportsProceedings of the 2023 ACM on Internet Measurement Conference10.1145/3618257.3624817(501-525)Online publication date: 24-Oct-2023
- Fischlin MMeng WJensen CCremers CKirda E(2023)Stealth Key Exchange and Confined Access to the Record Protocol Data in TLS 1.3Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security10.1145/3576915.3623099(2901-2914)Online publication date: 15-Nov-2023
- Show More Cited By