Gebhart, Genevieve; Kohno, Tadayoshi (26 April 2017). "Internet Censorship in Thailand: User Practices and Potential Threats". 2017 IEEE European Symposium on Security and Privacy (EuroS&P). IEEE. pp. 417–432. doi:10.1109/eurosp.2017.50. ISBN9781509057627. S2CID11637736.
Shahbar, K.; Zincir-Heywood, A. N. (9 November 2015). "Traffic flow analysis of tor pluggable transports". 2015 11th International Conference on Network and Service Management (CNSM). pp. 178–181. doi:10.1109/CNSM.2015.7367356. ISBN978-3-9018-8277-7. S2CID1199826.
Gebhart, Genevieve; Kohno, Tadayoshi (26 April 2017). "Internet Censorship in Thailand: User Practices and Potential Threats". 2017 IEEE European Symposium on Security and Privacy (EuroS&P). IEEE. pp. 417–432. doi:10.1109/eurosp.2017.50. ISBN9781509057627. S2CID11637736.
Shahbar, K.; Zincir-Heywood, A. N. (9 November 2015). "Traffic flow analysis of tor pluggable transports". 2015 11th International Conference on Network and Service Management (CNSM). pp. 178–181. doi:10.1109/CNSM.2015.7367356. ISBN978-3-9018-8277-7. S2CID1199826.
"Flash proxies", Applied Crypto Group in the Computer Science Department at Stanford University, accessed 21 March 2013. Archived 10 March 2013 at the Wayback Machine.
"Revocable Anonymity"Archived 25 September 2011 at the Wayback Machine, Stefan Köpsell, Rolf Wendolsky, Hannes Federrath, in Proc. Emerging Trends in Information and Communication Security: International Conference, Günter Müller (Ed.), ETRICS 2006, Freiburg, Germany, 6–9 June 2006, LNCS 3995, Springer-Verlag, Heidelberg 2006, pp.206-220
"Flash proxies", Applied Crypto Group in the Computer Science Department at Stanford University, accessed 21 March 2013. Archived 10 March 2013 at the Wayback Machine.
"About D.I.T."Dynamic Internet Technology. Archived from the original on 26 September 2011. Retrieved 16 September 2011.
"Revocable Anonymity"Archived 25 September 2011 at the Wayback Machine, Stefan Köpsell, Rolf Wendolsky, Hannes Federrath, in Proc. Emerging Trends in Information and Communication Security: International Conference, Günter Müller (Ed.), ETRICS 2006, Freiburg, Germany, 6–9 June 2006, LNCS 3995, Springer-Verlag, Heidelberg 2006, pp.206-220
Deibert, Ronald, ed. (2012). Access contested : security, identity, and resistance in Asian cyberspace information revolution and global politics. Cambridge, MA: MIT Press. p. 85. ISBN9780262298919. OCLC773034864.