{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T17:02:49Z","timestamp":1725728569761},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642390760"},{"type":"electronic","value":"9783642390777"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-39077-7_10","type":"book-chapter","created":{"date-parts":[[2013,6,3]],"date-time":"2013-06-03T21:39:59Z","timestamp":1370295599000},"page":"185-204","source":"Crossref","is-referenced-by-count":2,"title":["OSS: Using Online Scanning Services for Censorship Circumvention"],"prefix":"10.1007","author":[{"given":"David","family":"Fifield","sequence":"first","affiliation":[]},{"given":"Gabi","family":"Nakibly","sequence":"additional","affiliation":[]},{"given":"Dan","family":"Boneh","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","unstructured":"The OpenNet Initiative: OpenNet Initiative Internet censorship data (November 2011), \n                  \n                    http:\/\/opennet.net\/research\/data"},{"key":"10_CR2","doi-asserted-by":"crossref","unstructured":"Dingledine, R., Mathewson, N., Syverson, P.: Tor: The second-generation onion router. In: Proceedings of the 13th USENIX Security Symposium (August 2004)","DOI":"10.21236\/ADA465464"},{"key":"10_CR3","unstructured":"Wustrow, E., Wolchok, S., Goldberg, I., Halderman, J.A.: Telex: Anticensorship in the network infrastructure. In: Proc. 20th USENIX Security Symposium (2011)"},{"key":"10_CR4","unstructured":"Feamster, N., Balazinska, M., Harfst, G., Balakrishnan, H., Karger, D.: Infranet: Circumventing web censorship and surveillance. In: Proceedings of the 11th USENIX Security Symposium (2002)"},{"key":"10_CR5","unstructured":"Ultrareach Internet Corp.: Ultrasurf proxy, \n                  \n                    http:\/\/www.ultrasurf.us\/"},{"key":"10_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/978-3-642-31680-7_13","volume-title":"Privacy Enhancing Technologies","author":"D. Fifield","year":"2012","unstructured":"Fifield, D., Hardison, N., Ellithorpe, J., Stark, E., Boneh, D., Dingledine, R., Porras, P.: Evading censorship with browser-based proxies. In: Fischer-H\u00fcbner, S., Wright, M. (eds.) PETS 2012. LNCS, vol.\u00a07384, pp. 239\u2013258. Springer, Heidelberg (2012)"},{"key":"10_CR7","doi-asserted-by":"crossref","unstructured":"Weinberg, Z., Wang, J., Yegneswaran, V., Briesemeister, L., Cheung, S., Wang, F., Boneh, D.: StegoTorus: a camouflage proxy for the Tor anonymity system. In: ACM Conference on Computer and Communications Security, pp. 109\u2013120 (2012)","DOI":"10.1145\/2382196.2382211"},{"key":"10_CR8","unstructured":"Kadianakis, G., Mathewson, N.: Obfsproxy architecture (December 2011), \n                  \n                    https:\/\/www.torproject.org\/projects\/obfsproxy"},{"key":"10_CR9","unstructured":"Appelbaum, J., Mathewson, N.: Pluggable transports for circumvention (October 2010), \n                  \n                    https:\/\/gitweb.torproject.org\/torspec.git\/blob\/HEAD:\/proposals\/180-pluggable-transport.txt"},{"key":"10_CR10","unstructured":"Twitter: FAQs about Twitter\u2019s link service, \n                  \n                    https:\/\/support.twitter.com\/entries\/109623"},{"key":"10_CR11","doi-asserted-by":"crossref","unstructured":"Josefsson, S.: The base16, base32, and base64 data encodings. RFC 4648 (Proposed Standard) (October 2006)","DOI":"10.17487\/rfc4648"},{"key":"10_CR12","doi-asserted-by":"crossref","unstructured":"Fielding, R., Gettys, J., Mogul, J., Frystyk, H., Masinter, L., Leach, P., Berners-Lee, T.: Hypertext transfer protocol \u2013 HTTP\/1.1 (1999)","DOI":"10.17487\/rfc2616"},{"key":"10_CR13","unstructured":"Jacobs, I., Chisholm, W., Vanderheiden, G.: HTML techniques for web content accessibility guidelines 1.0. Technical report, W3C (December 2000), \n                  \n                    http:\/\/www.w3.org\/TR\/2000\/NOTE-WCAG10-HTML-TECHS-20001106\n                  \n                  \n                , latest version available at \n                  \n                    http:\/\/www.w3.org\/TR\/WCAG10-HTML-TECHS\/"},{"key":"10_CR14","doi-asserted-by":"crossref","unstructured":"Leech, M., et al.: SOCKS protocol version 5 (1996)","DOI":"10.17487\/rfc1928"},{"key":"10_CR15","unstructured":"PDFmyURL: Over usage (limited use) (October 2011), \n                  \n                    http:\/\/support.pdfmyurl.com\/topic\/getting-help-overusage"},{"key":"10_CR16","unstructured":"Fifield, D., Allaire, A.: Ticket #7559: Registration via indirect URL request (March 2013), \n                  \n                    https:\/\/trac.torproject.org\/projects\/tor\/ticket\/7559"}],"container-title":["Lecture Notes in Computer Science","Privacy Enhancing Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-39077-7_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T13:41:35Z","timestamp":1557754895000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-39077-7_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642390760","9783642390777"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-39077-7_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}