http://g7ee5otfyict57k24vjujuqzi6pd7iwvnsry2mt3svsgwzn6o6iynsad.onion/popets/2018/popets-2018-0020.php
Menu Home Proceedings Volume 2018 Previous Next Secure asymmetry and deployability for decoy routing systems Authors: Cecylia Bocovich (Cheriton School of Computer Science, University of Waterloo), Ian Goldberg (Cheriton School of Computer Science, University of Waterloo) Volume: 2018 Issue: 3 Pages: 43–62 DOI: https://doi.org/10.1515/popets-2018-0020 Download PDF Abstract: Censorship circumvention is often characterized as a cat-and-mouse game between a nation-state censor and the...