What it takes to boost Internet of Things privacy beyond encryption with unobservable communication: a survey and lessons learned from the first implementation of …

RC Staudemeyer, HC Pöhls, M Wójcik - Journal of Reliable Intelligent …, 2019 - Springer
the battle over privacy, this article uses the IoT devices’ smartness to technically strengthen
the privacy … Hence, in this work we concentrate on the network layer and present how to build …

Privacy enhancing technologies for solving the privacy-personalization paradox: Taxonomy and survey

N Kaaniche, M Laurent, S Belguith - Journal of Network and Computer …, 2020 - Elsevier
… in the privacy-preserving decision, ie, which entity is supporting the main cost for privacy
and whether the channel between the client and the server is affected. As depicted in Fig. 1, …

Measuring for privacy: From tracking to cloaking

N Samarasinghe - 2022 - spectrum.library.concordia.ca
The essential online services that we collect for privacy measurements, are done on a best
… Forwarding web requests to local IP addresses through DNS hijacking was reported for Iran […

RFC 9539: Unilateral Opportunistic Deployment of Encrypted Recursive-to-Authoritative DNS

DK Gillmor, J Salazar, P Hoffman - 2024 - dl.acm.org
… any coordination with other peers) to defend DNS query privacy against a passive network
monitor. The protections provided by the guidance in this document can be defeated by an …

ScaleNet: scalable and hybrid framework for cyber threat situational awareness based on DNS, URL, and email data analysis

R Vinayakumar, KP Soman… - Journal of Cyber …, 2019 - journals.riverpublishers.com
… This work takes the advantage of deep learning architectures to classify and correlate
malicious activities that are perceived from the various sources such as DNS, Email, and URLs. …

Normative challenges of identification in the Internet of Things: Privacy, profiling, discrimination, and the GDPR

S Wachter - Computer law & security review, 2018 - Elsevier
… achieve a fair balance between the interests of IoT providers and … the inherent tension
between privacy and identifiability in theThe paper will then examine the extent to which several …

[PDF][PDF] Security and Privacy Features Supported by Different Overlay-based ICN/IP Coexistence Architectures

M Sokolov, C Lal, M Conti - 2021 - researchgate.net
… investigates the support of security and privacy features in the … a defined DNS name is added
to the network and manages thethe rendezvous server’s DNS name and can use standard …

RFC2219: Use of DNS Aliases for Network Services

M Hamilton, R Wright - 1997 - dl.acm.org
… set of DNS aliases for the most popular network services that currently exist (see the "…
and any situation where privacy is a concern - such as the querying of medical records over …

Is Internet privacy dead? Recovering Internet privacy in an increasingly surveillant society.

JM Harmer - 2017 - etheses.whiterose.ac.uk
… whether or not Internet privacy is dead, with a specific focus on the technical aspects of …
privacy. The research explores the meaning of privacy in the information society and investigates …

Experiments with security and privacy in IoT networks

MR Schurgot, DA Shinberg… - 2015 IEEE 16th …, 2015 - ieeexplore.ieee.org
… Abstract—We explore the risks to security and privacy in IoT networks by setting up an
inexpensive … Following a DNS lookup, we observed the IoT hub establish a TCP connection with …
为了回应他人向 Google 提出的法律要求,我们已从此页移除了 1 条搜索结果。如果需要,您可以访问 LumenDatabase.org,了解这项要求的相关详细信息