Route bazaar: Automatic interdomain contract negotiation

I Castro, A Panda, B Raghavan, S Shenker… - 15th Workshop on Hot …, 2015 - usenix.org
While it is widely acknowledged that the Border Gateway Protocol (BGP) has many flaws,
most of the proposed fixes focus solely on improving the stability and security of its path …

[PDF][PDF] CORDON–a taxonomy of internet censorship resistance strategies

T Elahi, I Goldberg - University of Waterloo CACR, 2012 - Citeseer
We present a taxonomy of Internet censorship resistance strategies and techniques
extracted from analyzing proposed and implemented systems. We categorize the strategies …

[PDF][PDF] Slip** past the cordon: A systematization of Internet censorship resistance

T Elahi, CM Swanson, I Goldberg - Centre for Applied …, 2015 - cacr.uwaterloo.ca
The Internet censorship conflict is like a game of cat-and-mouse, in which the censor
discovers and acts on distinguishers that set the usage of censorship resistance systems …

[PDF][PDF] freedom. js: an Architecture for Serverless Web Applications

W Scott, R Cheng, A Krishnamurthy, T Anderson - raymondcheng.net
Delivering web software as a service has grown into a powerful paradigm for deploying a
wide range of Internetscale applications. However for end-users, accessing software as a …

[PDF][PDF] Privacy as a Service

R Cheng - raymondcheng.net
Privacy as a Service Page 1 Privacy as a Service Raymond Cheng Page 2 Build practical cloud
services that protect user privacy from powerful threats 2 Page 3 3 Page 4 Powerful Threats to …