le.html.[7]Psiphon.http://psiphone..[8]Reporterssansborder.censorship.icle.php3?id_article=23924.[9]Safewebprivacyproxycensoredinchina./articles/01/03/14/0755209.shtml.[10]A.Banerjee,M.Faloutsos,andL.Bhuyan.rackingp2pusers?working,2007.[11]S.BucheggerandJ.-Y.L.Boudec.Arobustreputationsystemforp2pandmobilead-works.InWorkshoponEconomicsofPeer-to-PeerSystems,Apr.2004.[12]I.Clarke,O.Sandberg,B.Wiley,andT.W.Hong.:Adistributedanonymousinformationstorageandretrievalsystem.InProceedingsofDesigningPrivacyEnhancingTechnologies:WorkshoponDesignIssuesinAnonymityandUnobservability,2000.[13]R.Clayton,S.Murdoch,andR.N.M.Watson.Ignoringthegreat?rewallofChina.In6thWorkshoponPrivacyEnhancingTechnologies,June2006.[14]J.Crandall,D.Zinn,M.Byrd,E.Barr,andR.East.Conceptdoppler:censorship.municationsSecurity,2007