Anti-circumvention misuse

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Towards More Sensible Anti-circumvention Regulations

The circumvention of technical protection systems and the making of tools to enable such circumventions may seem to financial cryptographers a wholly natural and constructive set of activities. This community knows that it is impossible to make encryption systems more secure unless one tests how strong they are from time to time by trying to break them. However, now that other industries, notab...

متن کامل

Circumvention of fingerprint scanners

One critical issue regarding the protection of confidential information or valuable items is to determine the identity of a person. Biometrics is supposed to offer this security in a user-friendly and secure way. One problem however is that there are ways to compromise systems based on biometric verification. Some of these biometrical features have known vulnerabilities. Persons with similar fa...

متن کامل

Tor’s Usability for Censorship Circumvention

Tor has grown beyond its original purpose as and has since become an important Internet circumvention tool. We specifically examine it usability as a censorship circumvention tool, an essential facet for adoption and use. We focus our analysis on the connection configuration dialog of Tor browser, as censorship circumvention requires correct transport configurations. Our talk will describe a fu...

متن کامل

Salmon: Robust Proxy Distribution for Censorship Circumvention

Many governments block their citizens’ access to much of the Internet. Simple workarounds are unreliable; censors quickly discover and patch them. Previously proposed robust approaches either have non-trivial obstacles to deployment, or rely on lowperformance covert channels that cannot support typical Internet usage such as streaming video. We present Salmon, an incrementally deployable system...

متن کامل

Randomizing Security Activities with Attacker Circumvention Strategies

Game theoretic methods for making resource allocation decision in security domains have attracted growing attention from both researchers and security practitioners, including deployed applications at both the LAX airport and the Federal Air Marshals Service. We develop a new class of security games designed to model decisions faced by the Transportation Security Administration and other agenci...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Technology and Society Magazine

سال: 2003

ISSN: 0278-0097

DOI: 10.1109/mtas.2003.1216242