Cracks in the internet's foundation: the future of the internet's infrastructure and global internet governance

D Voelsen - 2019 - ssoar.info
The first is about security and privacy in the Internet’s addressing system, the so-called Domain
Name System (DNS). … functions that are necessary for the operation of the DNS. A unified …

Programmable in-network obfuscation of traffic

L Wang, H Kim, P Mittal, J Rexford - arXiv preprint arXiv:2006.00097, 2020 - arxiv.org
the privacy/performance trade-off? In this paper, we push the boundaries of offloading privacy
… We test 1,000 DNS queries and examine the query time. Though using IPv6 may add up to …

[PDF][PDF] Cracks in the Internet's Foundation

D Voelsen - The Future of the internet's infrastructure and global …, 2019 - swp-berlin.org
The first is about security and privacy in the Internet’s addressing system, the so-called Domain
Name System (DNS). … functions that are necessary for the operation of the DNS. A unified …

[PDF][PDF] AN ONLINE PRIVACY ENHANCING FRAMEWORK BASED ON THE PRINCIPLES AND CAPABILITIES OF THE ONION ROUTER (TOR)

AM ABDULLAHI - 2021 - researchgate.net
the research area and specifies the boundaries of the study. It provides a preface to the
current challenges and risks of preserving online privacy … reverse DNS name for the exit relay. …

Assessing the Impact of DNS Configuration on Low Bandwidth Networks

JA Okuthe, A Terzoli - International Conference on e-Infrastructure and e …, 2022 - Springer
… of DNS traffic by relocating the DNS service from the Linux Terminal server to the gateway
router. We subsequently monitor the local loop bandwidth utilization to establish the accrued …

[图书][B] The IoT architect's guide to attainable security and privacy

DD Fagbemi, D Wheeler, JC Wheeler - 2019 - books.google.com
… Having looked at the evolving privacy challenges posed by the IoT, this chapter reviews the
DNS is the system protocol that is responsible for the resolution of human readable web …

Privacy-invading technologies and privacy by design

D Klitou - Information Technology and Law Series, 2014 - Springer
… surveillance, I believe the right to privacy will equally become more and more significant. …
Jossey-Bass O’Hara K, Shadbolt N (2008) The spy in the coffee machine: the end of privacy

Review paper on prevention of DNS spoofing

B Sharma - International Journal of Engineering and …, 2014 - indianjournals.com
… In this thesis we want to prevent the DNS server from DNS spoofing with efficient algorithm.
… A usability concerns of privacy and security because both system designers and attackers …

Inferring relative popularity of internet applications by actively querying dns caches

CE Wills, M Mikhailov, H Shang - Proceedings of the 3rd ACM SIGCOMM …, 2003 - dl.acm.org
the methodology in detail including how data are gathered and analyzed. In Section 4 we
apply the technique to a log of DNS requests and compare theThe privacy concerns of this …

Investigating Deployment Issues of DNS Root Server Instances from a China-wide View

F Zhang, B Liu, C Lu, Y Xing, H Duan… - … on Dependable and …, 2024 - ieeexplore.ieee.org
DNS root servers are the starting point of most DNSthe security and stability of DNS is
significant for global Internet operations. As the starting point of the whole domain space, the DNS