DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» DNS over HTTPS
DNS over HTTPS
Adopting Encrypted DNS in Enterprise Environments
Technical Impacts of DNS Privacy and Security on Network Service Scenarios
Ikev2 Configuration for Encrypted DNS
Paper, We Note That Work Is with Help from Volunteer OONI Probe Users
A Cybersecurity Terminarch: Use It Before We Lose It
Encrypting Network Traffic
Are Dns Requests Encrypted
DNS Over HTTPS—What Is It and Why Do People Care?
Addressing DNS Resolution on Federal Networks Memo
Recipes for Encrypting DNS Stub Resolver-To-Recursive Resolver Traffic
An End-To-End, Large-Scale Measurement of DNS-Over-Encryption: How Far Have We Come?
Security Now! #723 - 07-16-19 Encrypting DNS
Upcoming Browser DNS Changes and Impact to University IT Operations
Oblivious DNS Over HTTPS (Odoh) a Practical Privacy Enhancement to DNS
1. Position 2. Background
(Doh) and Trusted Recursive Resolver (TRR) Comment Period
Solving Unintended Challenges with Dot and Doh
Analyzing Encrypted Traffic
Top View
Assessing the Privacy Benefits of Domain Name Encryption
An Empirical Study of the Cost of DNS-Over-HTTPS
An Investigation on Information Leakage of DNS Over TLS
Programmable In-Network Obfuscation of DNS Traffic (Work-In-Progress) Liang Wang, Hyojoon Kim, Prateek Mittal, Jennifer Rexford Princeton University
Cache Poisoning in DNS Over HTTPS Clients Cache-Förgiftning Hos DNS Över HTTPS Klienter
Outline Public Key Authenticity Symmetric Key Servers Certificates
Large Scale Measurement on the Adoption of Encrypted
OTT DNS Providers Instead of the Network Provider, Yet Another Party Has Access to the End-User Data
DNS Over HTTPS (Doh): Making Sense of the NSA's Recommendation
A Comprehensive Study of DNS-Over-HTTPS Downgrade Attack
Encrypted DNS =⇒ Privacy? a Traffic Analysis Perspective
DOH) Pg 9 WHAT ISN’T FIXED by DOH and TRRS? Pg 11 DNS the DOMAIN NAME SYSTEM
Doh Insight: Detecting DNS Over HTTPS by Machine Learning
Keeping up with Crypto What the New Encryption Standards Mean for Your Business
Encrypting Network Traffic
Comparing the Effects of DNS, Dot, and Doh on Web Performance
Privacy Leakage Via IP-Based Website Fingerprinting
Come As You Are: Helping Unmodified Clients Bypass Censorship with Server-Side Evasion