-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathPrez.bib
42 lines (40 loc) · 2.03 KB
/
Prez.bib
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
@techreport{RFC8484,
author = {P. Hoffman and P. McManus},
title = {DNS Queries over HTTPS (DoH)},
howpublished = {Internet Requests for Comments},
type = {RFC},
number = {8484},
year = {2018},
month = {10},
url = {https://tools.ietf.org/html/rfc8484},
issn = {2070-1721},
publisher = {RFC Editor},
institution = {RFC Editor},
}
@Online {Bortzmeyer,
author = {Stéphane Bortzmeyer},
title = {RFC 8484: DNS Queries over HTTPS (DoH)},
date = {2019-10-04},
file = {:./references/8484.html.html:html},
url = {https://www.bortzmeyer.org/8484.html}
}
@Online {ISPA,
title = {ISPA announces finalists for 2019 Internet Heroes and Villains},
date = {2019-10-06},
file = {:./references/ispa-announces-finalists-for-2019-internet-heroes-and-villains-trump-and-mozilla-lead-the-way-as-villain-nominees-.html:html},
url = {https://www.ispa.org.uk/ispa-announces-finalists-for-2019-internet-heroes-and-villains-trump-and-mozilla-lead-the-way-as-villain-nominees/},
author= {The Internet Service Providers Association}}
@misc{RFC8404,
series = {Request for Comments},
number = 8404,
howpublished = {RFC 8404},
publisher = {RFC Editor},
doi = {10.17487/RFC8404},
url = {https://rfc-editor.org/rfc/rfc8404.txt},
author = {Kathleen Moriarty and Al Morton},
title = {{Effects of Pervasive Encryption on Operators}},
pagetotal = 53,
year = 2018,
month = jul,
abstract = {Pervasive monitoring attacks on the privacy of Internet users are of serious concern to both user and operator communities. RFC 7258 discusses the critical need to protect users' privacy when developing IETF specifications and also recognizes that making networks unmanageable to mitigate pervasive monitoring is not an acceptable outcome: an appropriate balance is needed. This document discusses current security and network operations as well as management practices that may be impacted by the shift to increased use of encryption to help guide protocol development in support of manageable and secure networks.},
}