A Survey on Content Retrieval on the Decentralised Web

N Keizer, O Ascigil, M Król, D Kutscher… - ACM Computing …, 2024 - dl.acm.org
The control, governance, and management of the web have become increasingly
centralised, resulting in security, privacy, and censorship concerns. Decentralised initiatives …

Challenges in decentralized name management: the case of ENS

P Xia, H Wang, Z Yu, X Liu, X Luo, G Xu… - Proceedings of the 22nd …, 2022 - dl.acm.org
DNS has often been criticized for inherent design flaws, which make the system vulnerable
to attack. Further, domain names are not fully controlled by users, meaning that they can …

Ethereum name service: the good, the bad, and the ugly

P Xia, H Wang, Z Yu, X Liu, X Luo, G Xu - arXiv preprint arXiv:2104.05185, 2021 - arxiv.org
DNS has always been criticized for its inherent design flaws, making the system vulnerable
to kinds of attacks. Besides, DNS domain names are not fully controlled by the users, which …

[PDF][PDF] IDV: Internet Domain Name Verification Based on Blockchain.

N Hu, Y Teng, Y Zhao, S Yin… - CMES-Computer Modeling …, 2021 - researchgate.net
The rapid development of blockchain technology has provided new ideas for network
security research. Blockchain-based network security enhancement solutions are attracting …

区块链在PKI 安全中的应用研究.

夏玲玲, 王群, 马卓, 梁广俊 - Journal of Frontiers of …, 2024 - search.ebscohost.com
重应用, 轻防御的设计思想致使传输控制协议/网际协议(TCP/IP) 体系结构设计之初就缺乏内生
安全属性, 使得公钥基础设施(PKI) 作为实现互联网不同实体之间通信真实性, 完整性 …

[HTML][HTML] Setonix: Blockchain-Based Hierarchy Domain Name System for Web3

J Jeon, S Park - Applied Sciences, 2024 - mdpi.com
DNS is an essential component for internet access, but the traditional centralized structure is
not suitable for the rapidly growing Web3 ecosystem. Currently, Web3 services rely on Web2 …

MSC: A Unique Chameleon Hash‐Based Off‐Chain Storage Framework for Metaverse Applications

C Xiong, T Yang, G Mao - International Journal of Network …, 2025 - Wiley Online Library
Blockchain has evolved into a secure and trustworthy environment for decentralized
applications, offering the advantages of tamper‐resistant, while simultaneously introducing …

DomainPKI: Domain aware certificate management

X Wang, M El-Said - Proceedings of the 21st Annual Conference on …, 2020 - dl.acm.org
Certificate Authority (CA) is a single point of failure in the trust model of X. 509 Public Key
Infrastructure (PKI), since CA is the only entity to sign and distribute public key certificates …

Public Key Infrastructure Approaches Based on Blockchain

DS Alani, AM Sagheer - … on Systems, Signals & Devices (SSD), 2024 - ieeexplore.ieee.org
Public-key infrastructure or PKI, is the fundamental technology that makes safe online
information sharing possible. But PKI is vulnerable to failures of Certificate Authorities (CAs) …

A Secure Two-Tier Domain Verification and Certificate Validation Integrating Intermediate Certificate Authorities and Secure Certificate Box

PP Rahoof, LR Nair, VP Thafasal Ijyas - Journal of Circuits, Systems …, 2023 - World Scientific
Digital certificates play a key role in the public key infrastructure (PKI). They are mainly used
to secure communication between a browser and a webserver to keep the transmitted data …