1. A mission statement for the IETF;Alvestrand Harald Tveit;RFC,2004
2. B. Detwiler B. Ledvina , Z. Eddinger and S. P. Polatkan . Detecting Unwanted Location Trackers. https://datatracker.ietf.org/doc/html/draft-detecting-unwanted-location-trackers-00 , 2023 . B. Detwiler B. Ledvina, Z. Eddinger and S. P. Polatkan. Detecting Unwanted Location Trackers. https://datatracker.ietf.org/doc/html/draft-detecting-unwanted-location-trackers-00, 2023.
3. Pervasive monitoring is an attack;Farrell Stephen;RFC,2014
4. A Survey on DNS Encryption: Current Development, Malware Misuse, and Inference Techniques
5. Rebekah Houser Zhou Li Chase Cotton and Haining Wang. An Investigation on Information Leakage of DNS over TLS. In CoNEXT. Rebekah Houser Zhou Li Chase Cotton and Haining Wang. An Investigation on Information Leakage of DNS over TLS. In CoNEXT.