![]() Ziye Deng, Zihan Liu, Zhouguo Chen, and Yubin Guo.article/10.1007/s11413-z Google Scholar Cross Ref Journal of Computer Virology and Hacking Techniques 16, 3 (2020), 217-227. ACER: detecting Shadowsocks server based on active probe technology. Jiaxing Cheng, Ying Li, Cheng Huang, Ailing Yu, and Tao Zhang.In Free and Open Communications on the Internet. On the Importance of Encrypted-SNI (ESNI) to Censorship Circumvention. Zimo Chai, Amirhossein Ghafari, and Amir Houmansadr.Retrieved August 2019 from Google Scholar David Borman, Bob Braden, Van Jacobson, and Richard Scheffenegger.Retrieved September 2020 from Google Scholar Exposing and Circumventing China's Censorship of ESNI. ![]() Kevin Bock, iyouport, Anonymous, Louis-Henri Merino, David Fifield, Amir Houmansadr, and Dave Levin.Retrieved February 2020 from Google Scholar Multipath TCP with real Smartphone applications. Matthieu Baerts and Quentin De Coninck. ![]() How China Detects and Blocks Shadowsocks.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |