{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T05:21:02Z","timestamp":1775107262781,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540687900","type":"print"},{"value":"9783540687931","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11957454_2","type":"book-chapter","created":{"date-parts":[[2006,12,11]],"date-time":"2006-12-11T09:15:43Z","timestamp":1165828543000},"page":"20-35","source":"Crossref","is-referenced-by-count":99,"title":["Ignoring the Great Firewall of China"],"prefix":"10.1007","author":[{"given":"Richard","family":"Clayton","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Steven J.","family":"Murdoch","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Robert N. M.","family":"Watson","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"2_CR1","doi-asserted-by":"crossref","unstructured":"Bellovin, S.: Defending Against Sequence Number Attacks. RFC1948, IETF (May 1996)","DOI":"10.17487\/rfc1948"},{"key":"2_CR2","unstructured":"Carter, E.: Secure Intrusion Detection Systems. Cisco Press (2001)"},{"key":"2_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/11767831_6","volume-title":"Privacy Enhancing Technologies","author":"R. Clayton","year":"2006","unstructured":"Clayton, R.: Failures in a Hybrid Content Blocking System. In: Danezis, G., Martin, D. (eds.) PET 2005. LNCS, vol.\u00a03856, Springer, Heidelberg (2006)"},{"key":"2_CR4","unstructured":"Clayton, R.: Anonymity and Traceability in Cyberspace. Tech Report UCAM-CL-TR-653, Computer Laboratory, University of Cambridge (2005)"},{"key":"2_CR5","unstructured":"Dornseif, M.: Government mandated blocking of foreign Web content. In: von Knop, J., Haverkamp, W., Jessen, E. (eds.) Security, E-Learning, E-Services: Proceedings of the 17. DFN-Arbeitstagung \u00fcber Kommunikationsnetze, D\u00fcsseldorf 2003. Lecture Notes in Informatics, pp. 617\u2013648 (2003)"},{"key":"2_CR6","unstructured":"Edelman, B.: Web Sites Sharing IP Addresses: Prevalence and Significance. Berkman Center for Internet and Society (February 2003), http:\/\/cyber.law.harvard.edu\/people\/edelman\/ip-sharing\/"},{"key":"2_CR7","unstructured":"King Abdulaziz City for Science and Technology: Local content filtering Procedure. Internet Services Unit, KACST (2004), http:\/\/www.isu.net.sa\/saudi-internet\/contenet-filtring\/filtring-mechanism.htm"},{"key":"2_CR8","unstructured":"The OpenNet Initiative: Probing Chinese search engine filtering. Bulletin 005 (August 2004), http:\/\/www.opennetinitiative.net\/bulletins\/005\/"},{"key":"2_CR9","unstructured":"The OpenNet Initiative: Internet Filtering in China in 2004\u20132005: A Country Study (June 2004), http:\/\/www.opennetinitiative.net\/studies\/china\/ONI_China_Country_Study.pdf"},{"key":"2_CR10","unstructured":"The OpenNet Initiative: Internet Filtering in Burma in 2005: A Country Study (October 2004), http:\/\/www.opennetinitiative.net\/burma\/ONI_Burma_Country_Study.pdf"},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"Postel, J. (ed.): Transmission Control Protocol: DARPA Internet Program Protocol Specification. RFC 793, IETF (1981)","DOI":"10.17487\/rfc0793"},{"key":"2_CR12","unstructured":"Norge, T.: Telenor and KRIPOS introduce Internet child pornography filter. Telenor Press Release (September 21, 2004), http:\/\/presse.telenor.no\/PR\/200409\/961319_5.html"},{"key":"2_CR13","unstructured":"US District Court for the Eastern District of Pennsylvania: CDT, ACLU, Plantagenet Inc. v Pappert, 337 F.Supp.2d 606 (September 10, 2004)"},{"key":"2_CR14","unstructured":"Villeneuve, N.: Censorship Is In the Router (June 3, 2005), http:\/\/ice.citizenlab.org\/?p=113"},{"key":"2_CR15","unstructured":"Watson, P.: Slipping in the Window: TCP Reset Attacks. CanSecWest\/core04 (2004)"},{"key":"2_CR16","unstructured":"Watson, R.: 20060607-tcp-ttl.diff (June 2006), http:\/\/www.cl.cam.ac.uk\/~rnw24\/patches\/"}],"container-title":["Lecture Notes in Computer Science","Privacy Enhancing Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11957454_2.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:21:37Z","timestamp":1619508097000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11957454_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540687900","9783540687931"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/11957454_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006]]}}}