{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:17:58Z","timestamp":1763468278679},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,10]]},"DOI":"10.1109\/lcn.2015.7366287","type":"proceedings-article","created":{"date-parts":[[2016,1,7]],"date-time":"2016-01-07T17:15:34Z","timestamp":1452186934000},"page":"91-99","source":"Crossref","is-referenced-by-count":12,"title":["Rebound: Decoy routing on asymmetric routes via error messages"],"prefix":"10.1109","author":[{"given":"Daniel","family":"Ellard","sequence":"first","affiliation":[]},{"given":"Christine","family":"Jones","sequence":"additional","affiliation":[]},{"given":"Victoria","family":"Manfredi","sequence":"additional","affiliation":[]},{"given":"W. Timothy","family":"Strayer","sequence":"additional","affiliation":[]},{"given":"Bishal","family":"Thapa","sequence":"additional","affiliation":[]},{"given":"Megan","family":"Van Welie","sequence":"additional","affiliation":[]},{"given":"Alden","family":"Jackson","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"article-title":"Psiphon","year":"0","author":"deibert","key":"ref10"},{"key":"ref11","article-title":"Tor: The second-generation onion router","author":"dingledine","year":"2004","journal-title":"13th USENIX Security Symposium"},{"key":"ref12","article-title":"Infranet: Circumventing Web Censorship and Surveillance","author":"feamster","year":"2002","journal-title":"USENIX Security Symposium"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2005.1577769"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36467-6_13"},{"key":"ref15","first-page":"187","article-title":"Cirri-pede: circumvention infrastructure using router redirection with plausible deniability","author":"houmansadr","year":"2011","journal-title":"Proceedings of the 2011 ACM Conference on Computer and Communications Security (CCS)"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23292"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1815396.1815506"},{"key":"ref18","article-title":"Decoy routing: Toward unblockable internet communication","author":"karlin","year":"2011","journal-title":"Proceedings of the 2011 USENIX Workshop on Free and Open Communications on the Internet (FOCI)"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382209"},{"year":"0","key":"ref4","article-title":"Guardster"},{"journal-title":"Global pass","year":"0","key":"ref3"},{"journal-title":"Ultras","year":"0","key":"ref6"},{"year":"0","key":"ref5","article-title":"Proxify web proxy"},{"key":"ref8","article-title":"Chipping away at censorship with user-generated content","author":"burnett","year":"2010","journal-title":"USENIX Security Symposium"},{"key":"ref7","article-title":"A web based covert file system","author":"baliga","year":"2007","journal-title":"Proc 11th Workshop Hot Topics in Operating Systems Usenix"},{"year":"0","key":"ref2","article-title":"Freegate"},{"year":"0","key":"ref1","article-title":"Analogbit: Tcp-over-dns tunnel software howto"},{"article-title":"Optimizing the placement of implicit proxies","year":"2012","author":"cesareo","key":"ref9"},{"key":"ref20","article-title":"Tapdance: End-to-middle anticensorship without flow blocking","author":"wustrow","year":"2014","journal-title":"23rd USENIX Security Symposium"},{"article-title":"Otrace &#x2013; traceroute on established connections","year":"2007","author":"zalewski","key":"ref22"},{"key":"ref21","article-title":"Telex: Anticensorship in the network infrastructure","author":"wustrow","year":"2011","journal-title":"Proceedings of the 20th USENIX Security Symposium"}],"event":{"name":"2015 IEEE 40th Conference on Local Computer Networks (LCN)","start":{"date-parts":[[2015,10,26]]},"location":"Clearwater Beach, FL","end":{"date-parts":[[2015,10,29]]}},"container-title":["2015 IEEE 40th Conference on Local Computer Networks (LCN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7360816\/7366232\/07366287.pdf?arnumber=7366287","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,25]],"date-time":"2017-03-25T00:21:54Z","timestamp":1490401314000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7366287\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/lcn.2015.7366287","relation":{},"subject":[],"published":{"date-parts":[[2015,10]]}}}