A survey on DNS encryption: Current development, malware misuse, and inference techniques

M Lyu, HH Gharakheili, V Sivaraman - ACM Computing Surveys, 2022 - dl.acm.org
The domain name system (DNS) that maps alphabetic names to numeric Internet Protocol
(IP) addresses plays a foundational role in Internet communications. By default, DNS …

Intel software guard extensions applications: A survey

NC Will, CA Maziero - ACM Computing Surveys, 2023 - dl.acm.org
Data confidentiality is a central concern in modern computer systems and services, as
sensitive data from users and companies are being increasingly delegated to such systems …

Towards automated auditing for account and session management flaws in single sign-on deployments

M Ghasemisharif, C Kanich… - 2022 IEEE Symposium on …, 2022 - ieeexplore.ieee.org
Single Sign-On (SSO) is both a core and critical component of user authentication and
authorization on the modern web, as it is often offered by web and mobile applications …

[HTML][HTML] S-zac: Hardening access control of service mesh using intel sgx for zero trust in cloud

C Han, T Kim, W Lee, Y Shin - Electronics, 2024 - mdpi.com
In cloud services, the zero-trust security paradigm has emerged as a key strategy to reduce
the large attack surface created by the complexity of cloud systems. Service mesh is a …

A privacy protection framework for medical image security without key dependency based on visual cryptography and trusted computing

D Zhang, L Ren, M Shafiq, Z Gu - Computational Intelligence …, 2023 - Wiley Online Library
The development of mobile Internet and the popularization of intelligent sensor devices
greatly facilitate the generation and transmission of massive multimedia data including …

Did we miss anything?: Towards privacy-preserving decentralized id architecture

S Huh, M Shim, J Lee, SS Woo… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Decentralized Identity (DID) is emerging as a new digital identity management scheme that
promises users complete control of their personal data and identification without central …

K-resolver: towards decentralizing encrypted DNS resolution

NP Hoang, I Lin, S Ghavamnia… - arxiv preprint arxiv …, 2020 - arxiv.org
Centralized DNS over HTTPS/TLS (DoH/DoT) resolution, which has started being deployed
by major hosting providers and web browsers, has sparked controversy among Internet …

A New Data Model for the Privacy Protection of Medical Images

L Ren, D Zhang - Computational Intelligence and Neuroscience, 2022 - Wiley Online Library
Benefiting from the intelligent Medical Internet of Things (IoMT), the medical industry has
dramatically improved its quality and productivity. The transmission of biomedical data in an …

A privacy-preserving route leak protection mechanism based on blockchain

J Yue, Y Qin, S Gao, W Su, G He… - 2021 IEEE International …, 2021 - ieeexplore.ieee.org
Route Leak Protection (RLP) is proposed to prevent route leaks in Border Gateway Protocol
(BGP). However, the Autonomous System (AS) cannot detect the RLP information that may …

[PDF][PDF] The Need to Improve DNS Security Architecture: An Adaptive Security Approach''

DO Alao, FY Ayankoya, OF Ajayi… - Information Dynamics …, 2023 - library.acadlore.com
The Domain Name System (DNS) is an essential component of the internet infrastructure.
Due to its importance, securing DNS becomes a necessity for current and future networks …