Proceedings of the ACM Internet Measurement Conference 2020
DOI: 10.1145/3419394.3423645
|View full text |Cite
|
Sign up to set email alerts
|

Accept the Risk and Continue

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 24 publications
0
3
0
Order By: Relevance
“…As result, we mapped 8 key roles to be carried out by a 6G architecture and 72 possible enabling technologies capable of performing these tasks. In addition, based on this literature review, we also mapped 4 architectural DSs, Approach of 6G Requirements [31], [32] x x x [33][34][35][36] x x x [37][38][39] x x [40][41][42] x x [43][44][45] x x x [46][47][48] x x x x [49], [50] x x x [51][52][53][54] x x x x x x x x [55][56][57][58][59][60][61][62][63][64][65][66][67][68][69][70] x [71], [72] x x x x x x [73], [74] x x x x x [75][76][77][78]…”
Section: State-of-art On 6gmentioning
confidence: 99%
“…As result, we mapped 8 key roles to be carried out by a 6G architecture and 72 possible enabling technologies capable of performing these tasks. In addition, based on this literature review, we also mapped 4 architectural DSs, Approach of 6G Requirements [31], [32] x x x [33][34][35][36] x x x [37][38][39] x x [40][41][42] x x [43][44][45] x x x [46][47][48] x x x x [49], [50] x x x [51][52][53][54] x x x x x x x x [55][56][57][58][59][60][61][62][63][64][65][66][67][68][69][70] x [71], [72] x x x x x x [73], [74] x x x x x [75][76][77][78]…”
Section: State-of-art On 6gmentioning
confidence: 99%
“…Measurements. There is a long thread of studies examining the web's certificate ecosystem from various vantage points [50,51,62,63,71,94,107,120]. Studies have specifically examined the cost of HTTPS [91]; how certificates are managed from the web administrator side [29,36,127], the CA side [73], within root stores [84,119], and by CDNs [29,80]; and the response to specific security vulnerabilities [126] like Heartbleed [49,127].…”
Section: Related Workmentioning
confidence: 99%
“…Due to the DNS's two-staged structure and participation of different entities in the name resolution procedure, proposing a comprehensive DNS scheme that provides security properties in both stages can be feasible. However, complex DNS alternatives that require significant changes are unlikely to gain wide-scale adoption, or the possibility of ANSes being potentially reluctant to change (e.g., in adoption of DNSSEC [25] or [60,94,91]. These anonymizing mechanisms can be used compatibly with the other secure-DNS schemes.…”
Section: Persistence Ofmentioning
confidence: 99%