{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T06:48:26Z","timestamp":1726037306200},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030249069"},{"type":"electronic","value":"9783030249076"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-24907-6_5","type":"book-chapter","created":{"date-parts":[[2019,7,10]],"date-time":"2019-07-10T15:02:46Z","timestamp":1562770966000},"page":"50-62","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["EPT: EDNS Privacy Tunnel for DNS"],"prefix":"10.1007","author":[{"given":"Lanlan","family":"Pan","sequence":"first","affiliation":[]},{"given":"Jie","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Anlei","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Xuebiao","family":"Yuchi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,11]]},"reference":[{"key":"5_CR1","unstructured":"Imana, B., Korolova, A., Heidemann, J.: Enumerating privacy leaks in DNS data collected above the recursive. In NDSS: DNS Privacy Workshop, February 2018"},{"key":"5_CR2","unstructured":"Siby, S., Juarez, M., Vallina-Rodriguez, N., Troncoso, C.: DNS Privacy not so private: the traffic analysis perspective (2018)"},{"issue":"1","key":"5_CR3","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1002\/poi3.195","volume":"11","author":"S Bradshaw","year":"2019","unstructured":"Bradshaw, S., DeNardis, L.: Privacy by infrastructure: the unresolved case of the domain name system. Policy Internet 11(1), 16\u201336 (2019)","journal-title":"Policy Internet"},{"key":"5_CR4","doi-asserted-by":"crossref","unstructured":"Contavalli, C., van der Gaast, W., Lawrence, D., Kumari, W.: Client Subnet in DNS Queries. RFC7871 (2016)","DOI":"10.17487\/RFC7871"},{"key":"5_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1007\/978-3-319-40667-1_17","volume-title":"Detection of Intrusions and Malware, and Vulnerability Assessment","author":"P Kintis","year":"2016","unstructured":"Kintis, P., Nadji, Y., Dagon, D., Farrell, M., Antonakakis, M.: Understanding the privacy implications of ECS. In: Caballero, J., Zurutuza, U., Rodr\u00edguez, R.J. (eds.) DIMVA 2016. LNCS, vol. 9721, pp. 343\u2013353. Springer, Cham (2016). \n                    https:\/\/doi.org\/10.1007\/978-3-319-40667-1_17"},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"Hu, Z., et al.: Specification for DNS over Transport Layer Security (TLS). RFC 7858 (2016)","DOI":"10.17487\/RFC7858"},{"key":"5_CR7","doi-asserted-by":"crossref","unstructured":"Reddy, T., Wing, D., Patil, P.: DNS over Datagram Transport Layer Security (DTLS). No. RFC 8094 (2017)","DOI":"10.17487\/RFC8094"},{"key":"5_CR8","unstructured":"Dempsky, M.: DNSCurve: link-level security for the domain name system. Work in Progress, draft-dempsky-dnscurve-01 (2010)"},{"key":"5_CR9","unstructured":"DNSCrypt. \n                    https:\/\/dnscrypt.org\/"},{"key":"5_CR10","unstructured":"Wijngaards, W., Wiley, G.: Confidential DNS. IETF Draft (2015). \n                    https:\/\/tools.ietf.org\/html\/draft-wijngaards-dnsop-confidentialdns-03"},{"key":"5_CR11","doi-asserted-by":"crossref","unstructured":"Kumari, W., Hoffman, P.: Decreasing Access Time to Root Servers by Running One on Loopback. RFC 7706 (2015)","DOI":"10.17487\/RFC7706"},{"key":"5_CR12","doi-asserted-by":"crossref","unstructured":"Bortzmeyer, S.: DNS Query Name Minimisation to Improve Privacy. RFC7816 (2016)","DOI":"10.17487\/RFC7816"},{"key":"5_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/978-3-319-11203-9_3","volume-title":"Computer Security - ESORICS 2014","author":"D Herrmann","year":"2014","unstructured":"Herrmann, D., Fuchs, K.-P., Lindemann, J., Federrath, H.: EncDNS: a lightweight privacy-preserving name resolution service. In: Kuty\u0142owski, M., Vaidya, J. (eds.) ESORICS 2014. LNCS, vol. 8712, pp. 37\u201355. Springer, Cham (2014). \n                    https:\/\/doi.org\/10.1007\/978-3-319-11203-9_3"},{"key":"5_CR14","doi-asserted-by":"crossref","unstructured":"Schmitt, P., Edmundson, A., Feamster, N.: Oblivious DNS: practical privacy for DNS queries. arXiv preprint \n                    arXiv:1806.00276\n                    \n                   (2018)","DOI":"10.2478\/popets-2019-0028"},{"key":"5_CR15","doi-asserted-by":"crossref","unstructured":"Damas, J., Graff, M., Vixie, P.: Extension mechanisms for DNS (EDNS (0)). RFC 6891 (2013)","DOI":"10.17487\/rfc6891"},{"key":"5_CR16","doi-asserted-by":"crossref","unstructured":"Greschbach, B., Pulls, T., Roberts, L.M., Winter, P., Feamster, N.: The Effect of DNS on Tor\u2019s Anonymity. arXiv preprint \n                    arXiv:1609.08187\n                    \n                   (2016)","DOI":"10.14722\/ndss.2017.23311"},{"key":"5_CR17","doi-asserted-by":"crossref","unstructured":"Chen, Y., Antonakakis, M., Perdisci, R., Nadji, Y., Dagon, D., Lee, W.: DNS noise: measuring the pervasiveness of disposable domains in modern DNS traffic. In: 44th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN), pp. 598\u2013609. IEEE, June 2014","DOI":"10.1109\/DSN.2014.61"},{"key":"5_CR18","unstructured":"dns_test_ept. \n                    https:\/\/github.com\/abbypan\/dns_test_ept"},{"key":"5_CR19","unstructured":"Mart\u00ednez, V.G., Encinas, L.H.: A comparison of the standardized versions of ECIES. In: Sixth International Conference on Information Assurance and Security (IAS), pp. 1\u20134. IEEE, August 2010"},{"key":"5_CR20","doi-asserted-by":"crossref","unstructured":"Pan, L., Yuchi, X., Wang, J., Hu, A.: A public key based EDNS privacy tunnel for DNS. In: 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications\/12th IEEE International Conference on Big Data Science and Engineering (TrustCom\/BigDataSE), pp. 1722\u20131724. IEEE, August 2018","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00260"}],"container-title":["Lecture Notes in Computer Science","Security, Privacy, and Anonymity in Computation, Communication, and Storage"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-24907-6_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,10]],"date-time":"2019-07-10T15:03:51Z","timestamp":1562771031000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-24907-6_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030249069","9783030249076"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-24907-6_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"11 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SpaCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Atlanta, GA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"spaccs2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/cse.stfx.ca\/~cybermatics\/2019\/spaccs\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}