DNS SECURITY : A REVIEW
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 0, Vol 4, Issue 8
Abstract
DNS is the basic method which allows a domain name to lead customers to your website as they attempt to log onto your site. DNS has been extended to provide security services (DNSSEC) mainly through public-key cryptography. This is a review paper on the security problems affecting the Domain Name System. Corrupting the operation of DNS in this way can lead to many kinds of fraud and other malicious activity. By plugging some of the largest security holes in the Internet, DNSSEC has the potential to significantly expand the trustworthiness and thus the usefulness of the Internet as a whole.
Authors and Affiliations
Darshana Hooda
PROPOSED SRAM CELL USING LOW POWER SCHMITT TRIGGER IN SUBTHRESHOLD REGION WHICH ADAPTS ITS OWN THRESHOLD
In 1950, an American biophysicist and polymath Otto Schmitt coined the term ‘Biomimetics’ (imitation of nature element, systems, models for the purpose of solving complex problems of the human). Proceeding on the...
Evaluation of Various Edge Detection Algorithms – Review
Edge detection is the most common preprocessing step in many image processing algorithms such as image enhancement, image segmentation, tracking and image/video coding. Edge detection is the name for a set of mat...
COMPRESSING BIOMEDICAL IMAGE BY USING INTEGER WAVELET TRANSFORM AND PREDICTIVE ENCODER
Image compression has become an important process in today’s world of information exchange. It helps in effective utilization of high speed network resources. Medical image compression has an important role in...
Design and Simulation of Canny Edge Detection
Edge is one of the prominent features in the image processing applications. The edge detection algorithm is carried out by using different methods. Canny edge algorithm is one of the well known edge detection algo...
Landslide Monitoring System Based on Dual Receiver Measurements
Many approaches have been used to monitor landslides. The detection techniques vary and depend on the range between the area of interest and receiving devices. For ranges up to a few hundred meters, the laser ligh...