Even though the Internet promotes data sharing and transparency, however it does not protect digital content. In today's digital world, it has become a difficult task to release a DRM …
P Xia, H Wang, Z Yu, X Liu, X Luo, G Xu… - Proceedings of the 22nd …, 2022 - dl.acm.org
DNS has often been criticized for inherent design flaws, which make the system vulnerable to attack. Further, domain names are not fully controlled by users, meaning that they can …
The proliferation of the internet of things (IoT) within the emergence of five-generation (5G) networks has received a huge attention in both industrial and academic domains. A 5G …
A Garba, Z Chen, Z Guan… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Nowadays, existing public key infrastructures (PKIs) certificate authentication suffers from many security failures. Trusted certificate authorities (CAs) can issue a valid certificate for …
P Xia, H Wang, Z Yu, X Liu, X Luo, G Xu - arXiv preprint arXiv:2104.05185, 2021 - arxiv.org
DNS has always been criticized for its inherent design flaws, making the system vulnerable to kinds of attacks. Besides, DNS domain names are not fully controlled by the users, which …
Recently, the focus on the Internet of Things (IoT) has rocketed in parallel with the evolution of mobile fifth-generation (5G) networks. To fully utilize IoT, which wirelessly connects …
The current landscape of the core Internet technologies shows considerable centralisation with the big tech companies controlling the vast majority of traffic and services. This situation …
A Garba, Q Hu, Z Chen… - 2020 IEEE 22nd …, 2020 - ieeexplore.ieee.org
Recently, real-world attacks against the web Public Key Infrastructure (PKI) have arisen more frequently. The current PKI that use Registration Authorities/Certificate Authorities …
Blockchain DNS has emerged as an alternative solution to traditional DNS to address many of its inherent drawbacks. In this regard, a blockchain DNS approach is decentralised …