Author of the publication

Whiskey, Weed, and Wukan on the World Wide Web: On Measuring Censors' Resources and Motivations.

, , , , , , , and . FOCI, USENIX Association, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Puppeteer: Component-based Adaptation for Mobile Computing, , and . In Proceedings of the 3rd Usenix Symposium on Internet Technologies and Systems, page 159--170. (2000)Practical Robust Localization over Large-Scale 802.11 Wireless Networks, , , , , and . Proceedings of the Tenth ACM International Conference on Mobile Computing and Networking (MOBICOM), (2002)Technical perspective - Native Client: a clever alternative.. Commun. ACM, 53 (1): 90 (2010)Rebooting the CS publication process.. Commun. ACM, 54 (10): 32-35 (2011)The Mason Test: A Defense Against Sybil Attacks in Wireless Networks Without Trusted Authorities., , , , and . CoRR, (2014)Robotics-based location sensing using wireless ethernet., , , , , and . MobiCom, page 227-238. ACM, (2002)On the Usability of HTTPS Deployment., , , , , and . CHI, page 310. ACM, (2019)Efficient Data Structures For Tamper-Evident Logging., and . USENIX Security Symposium, page 317-334. USENIX Association, (2009)Robust and Reverse-Engineering Resilient PUF Authentication and Key-Exchange by Substring Matching., , , , and . IEEE Trans. Emerg. Top. Comput., 2 (1): 37-49 (2014)The Decline of Social Media Censorship and the Rise of Self-Censorship after the 2016 Failed Turkish Coup., , , and . FOCI @ USENIX Security Symposium, USENIX Association, (2017)