ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2401.15828
  4. Cited By
The Spectre of Surveillance and Censorship in Future Internet Architectures
v1v2 (latest)

The Spectre of Surveillance and Censorship in Future Internet Architectures

Proceedings on Privacy Enhancing Technologies (PoPETs), 2024
29 January 2024
Michael Wrana
Diogo Barradas
N. Asokan
ArXiv (abs)PDFHTML

Papers citing "The Spectre of Surveillance and Censorship in Future Internet Architectures"

22 / 22 papers shown
Title
A Survey of Internet Censorship and its Measurement: Methodology, Trends, and Challenges
A Survey of Internet Censorship and its Measurement: Methodology, Trends, and Challenges
S. Wendzel
Simon Volpert
S. Zillien
Julia Lenz
Philip Rünz
L. Caviglione
229
0
0
20 Feb 2025
Protocols to Code: Formal Verification of a Next-Generation Internet
  Router
Protocols to Code: Formal Verification of a Next-Generation Internet Router
João C. Pereira
Tobias Klenze
Sofia Giampietro
Markus Limbeck
Dionysios Spiliopoulos
...
Marco Eilers
Christoph Sprenger
David Basin
Peter Muller
A. Perrig
100
7
0
09 May 2024
Toward Uncensorable, Anonymous and Private Access Over Satoshi
  Blockchains
Toward Uncensorable, Anonymous and Private Access Over Satoshi Blockchains
Ruben Recabarren
Bogdan Carbunar
103
2
0
16 Oct 2021
Balboa: Bobbing and Weaving around Network Censorship
Balboa: Bobbing and Weaving around Network CensorshipUSENIX Security Symposium (USENIX Security), 2021
Marc B. Rosen
James Parker
A. Malozemoff
56
18
0
13 Apr 2021
De-anonymisation attacks on Tor: A Survey
De-anonymisation attacks on Tor: A SurveyIEEE Communications Surveys and Tutorials (COMST), 2020
Ishan Karunanayake
Nadeem Ahmed
R. Malaney
R. Islam
S. Jha
202
62
0
28 Sep 2020
Practical Traffic Analysis Attacks on Secure Messaging Applications
Practical Traffic Analysis Attacks on Secure Messaging ApplicationsNetwork and Distributed System Security Symposium (NDSS), 2020
Alireza Bahramali
Ramin Soltani
Amir Houmansadr
Dennis Goeckel
Don Towsley
120
54
0
01 May 2020
Cached and Confused: Web Cache Deception in the Wild
Cached and Confused: Web Cache Deception in the WildUSENIX Security Symposium (USENIX Security), 2019
Seyed Ali Mirheidari
Sajjad Arshad
Kaan Onarlioglu
B. Crispo
E. Kirda
William K. Robertson
166
36
0
21 Dec 2019
Breaking and (Partially) Fixing Provably Secure Onion Routing
Breaking and (Partially) Fixing Provably Secure Onion RoutingIEEE Symposium on Security and Privacy (IEEE S&P), 2019
C. Kuhn
Martin Beck
T. Strufe
85
35
0
30 Oct 2019
ICLab: A Global, Longitudinal Internet Censorship Measurement Platform
ICLab: A Global, Longitudinal Internet Censorship Measurement PlatformIEEE Symposium on Security and Privacy (S&P), 2019
Arian Akhavan Niaki
Shinyoung Cho
Zachary Weinberg
Nguyen Phong Hoang
Abbas Razaghpanah
Nicolas Christin
Phillipa Gill
104
92
0
09 Jul 2019
Tik-Tok: The Utility of Packet Timing in Website Fingerprinting Attacks
Tik-Tok: The Utility of Packet Timing in Website Fingerprinting Attacks
Mohammad Saidur Rahman
Payap Sirinam
Nate Mathews
K. Gangadhara
M. Wright
159
146
0
18 Feb 2019
TARANET: Traffic-Analysis Resistant Anonymity at the NETwork layer
TARANET: Traffic-Analysis Resistant Anonymity at the NETwork layer
Chong Chen
D. E. Asoni
A. Perrig
David Barrera
G. Danezis
Carmela Troncoso
104
53
0
23 Feb 2018
Deep Fingerprinting: Undermining Website Fingerprinting Defenses with
  Deep Learning
Deep Fingerprinting: Undermining Website Fingerprinting Defenses with Deep Learning
Payap Sirinam
Mohsen Imani
Marc Juárez
M. Wright
364
544
0
07 Jan 2018
Network Traffic Obfuscation and Automated Internet Censorship
Network Traffic Obfuscation and Automated Internet Censorship
Lucas Dixon
Thomas Ristenpart
Thomas Shrimpton
155
29
0
13 May 2016
Security, Privacy, and Access Control in Information-Centric Networking:
  A Survey
Security, Privacy, and Access Control in Information-Centric Networking: A Survey
R. Tourani
Travis Mick
Satyajayant Misra
Gaurav Panwar
154
258
0
10 Mar 2016
Security and Privacy in Future Internet Architectures - Benefits and
  Challenges of Content Centric Networks
Security and Privacy in Future Internet Architectures - Benefits and Challenges of Content Centric Networks
Roman Lutz
EgoV
205
10
0
06 Jan 2016
k-fingerprinting: a Robust Scalable Website Fingerprinting Technique
k-fingerprinting: a Robust Scalable Website Fingerprinting TechniqueUSENIX Security Symposium (USENIX Security), 2015
Jamie Hayes
G. Danezis
202
429
0
02 Sep 2015
SCION Five Years Later: Revisiting Scalability, Control, and Isolation
  on Next-Generation Networks
SCION Five Years Later: Revisiting Scalability, Control, and Isolation on Next-Generation Networks
David Barrera
Raphael M. Reischuk
Pawel Szalachowski
A. Perrig
105
17
0
07 Aug 2015
HORNET: High-speed Onion Routing at the Network Layer
HORNET: High-speed Onion Routing at the Network LayerConference on Computer and Communications Security (CCS), 2015
Chong Chen
D. E. Asoni
David Barrera
G. Danezis
A. Perrig
GNN
183
146
0
21 Jul 2015
IPFS - Content Addressed, Versioned, P2P File System
IPFS - Content Addressed, Versioned, P2P File System
J. Benet
202
1,977
0
14 Jul 2014
Privacy in Content-Oriented Networking: Threats and Countermeasures
Privacy in Content-Oriented Networking: Threats and Countermeasures
Chaabane Abdelberi
Emiliano De Cristofaro
M. Kâafar
E. Uzun
439
127
0
22 Nov 2012
ANDaNA: Anonymous Named Data Networking Application
ANDaNA: Anonymous Named Data Networking ApplicationNetwork and Distributed System Security Symposium (NDSS), 2011
S. DiBenedetto
Paolo Gasti
Gene Tsudik
E. Uzun
230
151
0
09 Dec 2011
Nation-State Routing: Censorship, Wiretapping, and BGP
Nation-State Routing: Censorship, Wiretapping, and BGP
Josh Karlin
Stephanie Forrest
Jennifer Rexford
242
55
0
18 Mar 2009
1