no code implementations • 25 Sep 2017 • David Fifield, Lynn Tsai, Qi Zhong
Our goal is to empirically discover how censors react to the introduction of new proxy servers that can be used to circumvent their information controls.
Cryptography and Security
no code implementations • 26 Mar 2015 • David Fifield, Torbjørn Follan, Emil Lunde
We describe a technique for attributing parts of a written text to a set of unknown authors.