Philipp Winter keeps a fairly comprehensive and up-to-date archive of papers that often cover network steganography for circumvention purposes under CensorBib: http://www.cs.kau.se/philwint/censorbib/
On Sun, Nov 3, 2013 at 11:29 PM, Lucas Dixon <[email protected]> wrote: > Hi, > > I'm trying to put together a good reading and person list for what is > currently known on network steganography (in particular, network traffic > obfuscation): > > What are the methods by which one type of traffic can be distinguished > from another, and how can one type of traffic be hidden as another. How > much computation and extra bandwidth do you have to pay to make it how much > harder to distinguish? And what's the current computation and memory > capacity of DPI machines? > > Any suggestions? > > Thanks! > lucas > > -- > Lucas Dixon | Google Ideas > > -- > Liberationtech is public & archives are searchable on Google. Violations > of list guidelines will get you moderated: > https://mailman.stanford.edu/mailman/listinfo/liberationtech. > Unsubscribe, change to digest, or change password by emailing moderator at > [email protected]. > -- *Collin David Anderson* averysmallbird.com | @cda | Washington, D.C.
-- Liberationtech is public & archives are searchable on Google. Violations of list guidelines will get you moderated: https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, change to digest, or change password by emailing moderator at [email protected].
