{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T17:46:45Z","timestamp":1772041605372,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":26,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642316791","type":"print"},{"value":"9783642316807","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-31680-7_13","type":"book-chapter","created":{"date-parts":[[2012,6,27]],"date-time":"2012-06-27T13:40:32Z","timestamp":1340804432000},"page":"239-258","source":"Crossref","is-referenced-by-count":29,"title":["Evading Censorship with Browser-Based Proxies"],"prefix":"10.1007","author":[{"given":"David","family":"Fifield","sequence":"first","affiliation":[]},{"given":"Nate","family":"Hardison","sequence":"additional","affiliation":[]},{"given":"Jonathan","family":"Ellithorpe","sequence":"additional","affiliation":[]},{"given":"Emily","family":"Stark","sequence":"additional","affiliation":[]},{"given":"Dan","family":"Boneh","sequence":"additional","affiliation":[]},{"given":"Roger","family":"Dingledine","sequence":"additional","affiliation":[]},{"given":"Phil","family":"Porras","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","unstructured":"The OpenNet Initiative: OpenNet Initiative Internet censorship data (2011), \n                    \n                      http:\/\/opennet.net\/research\/data"},{"key":"13_CR2","doi-asserted-by":"crossref","unstructured":"Dingledine, R., Mathewson, N., Syverson, P.: Tor: The second-generation onion router. In: Proceedings of the 13th USENIX Security Symposium (August 2004)","DOI":"10.21236\/ADA465464"},{"key":"13_CR3","unstructured":"Wustrow, E., Wolchok, S., Goldberg, I., Halderman, J.A.: Telex: Anticensorship in the network infrastructure. In: Proc. 20th USENIX Security Symposium (2011)"},{"key":"13_CR4","unstructured":"Ultrareach Internet Corp.: Ultrasurf proxy, \n                    \n                      http:\/\/www.ultrasurf.us\/"},{"key":"13_CR5","unstructured":"Dingledine, R., Mathewson, N.: Design of a blocking-resistant anonymity system. Technical Report 2006-1, The Tor Project (November 2006)"},{"key":"13_CR6","unstructured":"Kadianakis, G., Mathewson, N.: Obfsproxy architecture (2011), \n                    \n                      https:\/\/www.torproject.org\/projects\/obfsproxy"},{"key":"13_CR7","unstructured":"Weinberg, Z., Wang, J., Yegneswaran, V., Briesemeister, L., Boneh, D., Wang, F. (StegoTorus: A camouflage proxy for the Tor anonymity system)"},{"key":"13_CR8","unstructured":"Tor Metrics Portal: Users (2011), \n                    \n                      https:\/\/metrics.torproject.org\/users.html"},{"key":"13_CR9","unstructured":"Lewman, A.: Tor partially blocked in China (September 2009), \n                    \n                      https:\/\/blog.torproject.org\/blog\/tor-partially-blocked-china"},{"key":"13_CR10","doi-asserted-by":"crossref","unstructured":"McLachlan, J., Hopper, N.: On the risks of serving whenever you surf: Vulnerabilities in Tor\u2019s blocking resistance design. In: Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2009). ACM (November 2009)","DOI":"10.1145\/1655188.1655193"},{"key":"13_CR11","unstructured":"Wilde, T.: Knock knock knockin\u2019 on bridges\u2019 doors (January 2012), \n                    \n                      https:\/\/blog.torproject.org\/blog\/knock-knock-knockin-bridges-doors"},{"key":"13_CR12","unstructured":"Winter, P., Lindskog, S.: How China is blocking Tor. Technical report, Karlstad University (April 2012)"},{"key":"13_CR13","unstructured":"Appelbaum, J., Mathewson, N.: Pluggable transports for circumvention (October 2010), \n                    \n                      https:\/\/gitweb.torproject.org\/torspec.git\/blob\/HEAD:\/proposals\/180-pluggable-transport.txt"},{"key":"13_CR14","unstructured":"W3C: Cross-origin resource sharing (April 2012), \n                    \n                      http:\/\/www.w3.org\/TR\/cors\/"},{"key":"13_CR15","unstructured":"Adobe Systems Incorporated: Adobe Flash Player 9 security (July 2008), \n                    \n                      http:\/\/wwwimages.adobe.com\/www.adobe.com\/content\/dam\/Adobe\/en\/devnet\/flashplayer\/pdfs\/flash_player_9_security.pdf"},{"key":"13_CR16","unstructured":"Tor Metrics Portal: Time in seconds to complete 5 MiB request (2012), \n                    \n                      https:\/\/metrics.torproject.org\/performance.html"},{"key":"13_CR17","unstructured":"Loesing, K.: torperf measurements-HOWTO (2011), \n                    \n                      https:\/\/gitweb.torproject.org\/torperf.git\/blob_plain\/HEAD:\/measurements-HOWTO"},{"key":"13_CR18","doi-asserted-by":"crossref","unstructured":"Arlitt, M.F., Williamson, C.L.: Internet web servers: workload characterization and performance implications. IEEE\/ACM Transactions on Networking\u00a05 (October 1997)","DOI":"10.1109\/90.649565"},{"key":"13_CR19","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1109\/90.392383","volume":"3","author":"V. Paxson","year":"1995","unstructured":"Paxson, V., Floyd, S.: Wide area traffic: the failure of Poisson modeling. IEEE\/ACM Trans. Netw.\u00a03, 226\u2013244 (1995)","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"13_CR20","unstructured":"Little, J.D.C.: A proof of the queuing formula L = \u03bbW (1960)"},{"key":"13_CR21","doi-asserted-by":"crossref","unstructured":"Rosenberg, J., Mahy, R., Matthews, P., Wing, D.: Session Traversal Utilities for NAT (STUN). RFC 5389 (Proposed Standard) (October 2008)","DOI":"10.17487\/rfc5389"},{"key":"13_CR22","unstructured":"Adobe Systems Incorporated: Real Time Media Flow Protocol (October 2008), \n                    \n                      http:\/\/labs.adobe.com\/technologies\/cirrus\/"},{"key":"13_CR23","doi-asserted-by":"crossref","unstructured":"M\u00fcller, A., Evans, N., Grothoff, C., Kamkar, S.: Autonomous NAT traversal. In: 10th IEEE International Conference on Peer-to-Peer Computing (P2P) (2010)","DOI":"10.1109\/P2P.2010.5569996"},{"key":"13_CR24","unstructured":"W3C: WebRTC 1.0: Real-time communication between browsers (January 2012), \n                    \n                      http:\/\/dev.w3.org\/2011\/webrtc\/editor\/webrtc.html"},{"key":"13_CR25","unstructured":"Lynn, B.: PBC library, \n                    \n                      http:\/\/crypto.stanford.edu\/pbc\/"},{"key":"13_CR26","unstructured":"Feamster, N., Balazinska, M., Harfst, G., Balakrishnan, H., Karger, D.: Infranet: Circumventing web censorship and surveillance. In: Proceedings of the 11th USENIX Security Symposium (2002)"}],"container-title":["Lecture Notes in Computer Science","Privacy Enhancing Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-31680-7_13.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T07:43:36Z","timestamp":1620114216000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-31680-7_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642316791","9783642316807"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-31680-7_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012]]}}}