A survey on DNS encryption: Current development, malware misuse, and inference techniques
The domain name system (DNS) that maps alphabetic names to numeric Internet Protocol
(IP) addresses plays a foundational role in Internet communications. By default, DNS …
(IP) addresses plays a foundational role in Internet communications. By default, DNS …
Intel software guard extensions applications: A survey
Data confidentiality is a central concern in modern computer systems and services, as
sensitive data from users and companies are being increasingly delegated to such systems …
sensitive data from users and companies are being increasingly delegated to such systems …
Towards automated auditing for account and session management flaws in single sign-on deployments
Single Sign-On (SSO) is both a core and critical component of user authentication and
authorization on the modern web, as it is often offered by web and mobile applications …
authorization on the modern web, as it is often offered by web and mobile applications …
[HTML][HTML] S-zac: Hardening access control of service mesh using intel sgx for zero trust in cloud
In cloud services, the zero-trust security paradigm has emerged as a key strategy to reduce
the large attack surface created by the complexity of cloud systems. Service mesh is a …
the large attack surface created by the complexity of cloud systems. Service mesh is a …
A privacy protection framework for medical image security without key dependency based on visual cryptography and trusted computing
The development of mobile Internet and the popularization of intelligent sensor devices
greatly facilitate the generation and transmission of massive multimedia data including …
greatly facilitate the generation and transmission of massive multimedia data including …
Did we miss anything?: Towards privacy-preserving decentralized id architecture
Decentralized Identity (DID) is emerging as a new digital identity management scheme that
promises users complete control of their personal data and identification without central …
promises users complete control of their personal data and identification without central …
K-resolver: towards decentralizing encrypted DNS resolution
Centralized DNS over HTTPS/TLS (DoH/DoT) resolution, which has started being deployed
by major hosting providers and web browsers, has sparked controversy among Internet …
by major hosting providers and web browsers, has sparked controversy among Internet …
A New Data Model for the Privacy Protection of Medical Images
L Ren, D Zhang - Computational Intelligence and Neuroscience, 2022 - Wiley Online Library
Benefiting from the intelligent Medical Internet of Things (IoMT), the medical industry has
dramatically improved its quality and productivity. The transmission of biomedical data in an …
dramatically improved its quality and productivity. The transmission of biomedical data in an …
A privacy-preserving route leak protection mechanism based on blockchain
Route Leak Protection (RLP) is proposed to prevent route leaks in Border Gateway Protocol
(BGP). However, the Autonomous System (AS) cannot detect the RLP information that may …
(BGP). However, the Autonomous System (AS) cannot detect the RLP information that may …
[PDF][PDF] The Need to Improve DNS Security Architecture: An Adaptive Security Approach''
DO Alao, FY Ayankoya, OF Ajayi… - Information Dynamics …, 2023 - library.acadlore.com
The Domain Name System (DNS) is an essential component of the internet infrastructure.
Due to its importance, securing DNS becomes a necessity for current and future networks …
Due to its importance, securing DNS becomes a necessity for current and future networks …