2023
DOI: 10.1049/cmu2.12589
|View full text |Cite
|
Sign up to set email alerts
|

Blind matching algorithm based proxy distribution against internet censorship

Abstract: Proxy based censorship circumvention technique is treated as one of the most promising approaches to fighting against Internet censorship, and its practical applications like the onion router and Lantern have been widely utilized. However, the proxy distribution, as a basic and core issue, still remains unsolved due to (i) the finiteness and non‐renewable nature of proxy resources, (ii) the heterogeneity of clients and proxies requirements, and (iii) the existence of secondary censorship. In this paper, a win‐… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1
1

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 37 publications
(81 reference statements)
0
1
0
Order By: Relevance
“…Obviously, it is vital to keep p 1 and p 2 in small values to achieve higher SuTP and SeTP performances. In this way, traditional security-enhanced technologies like Sybils detection [12,13] and proxy information security distribution [14][15][16] can be well integrated into our proposed system since they focus on enhancing the security degree of proxies, i.e. lowering p 1 and p 2 .…”
Section: Performance Analysismentioning
confidence: 99%
“…Obviously, it is vital to keep p 1 and p 2 in small values to achieve higher SuTP and SeTP performances. In this way, traditional security-enhanced technologies like Sybils detection [12,13] and proxy information security distribution [14][15][16] can be well integrated into our proposed system since they focus on enhancing the security degree of proxies, i.e. lowering p 1 and p 2 .…”
Section: Performance Analysismentioning
confidence: 99%