-
1
-
-
70349270357
-
-
D. E. E. 3d. Domain name system (dns) cookies. http://tools.ietf.org/ html/draft-eastlake-dnsext-cookies-03, 2008.
-
D. E. E. 3d. Domain name system (dns) cookies. http://tools.ietf.org/ html/draft-eastlake-dnsext-cookies-03, 2008.
-
-
-
-
2
-
-
70349301129
-
-
D. E. 3rd. Dns request and transaction signatures (SIG(O)s). http://tools.ietf.org/html/rfc2931, September 2000.
-
D. E. 3rd. Dns request and transaction signatures (SIG(O)s). http://tools.ietf.org/html/rfc2931, September 2000.
-
-
-
-
3
-
-
70349290312
-
-
D. E. 3rd. Secret key establishment for DNS (TKEY RR). http://tools.ietf.org/html/rfc2930, September 2000.
-
D. E. 3rd. Secret key establishment for DNS (TKEY RR). http://tools.ietf.org/html/rfc2930, September 2000.
-
-
-
-
12
-
-
33745469440
-
-
Internet Assigned Numbers Authority, numbers
-
Internet Assigned Numbers Authority. Port numbers, http://www.iana.org/ assignments/port-numbers, 2008.
-
(2008)
Port numbers
-
-
-
23
-
-
70349299603
-
-
NIST. Announcing the advanced encryption standard (aes). ttp://csrc.nist.gov/publications/fips/fips197/fips-197.pdf ,2001.
-
NIST. Announcing the advanced encryption standard (aes). ttp://csrc.nist.gov/publications/fips/fips197/fips-197.pdf ,2001.
-
-
-
-
24
-
-
85040646893
-
-
K. Park, V. S. Pai, L. Peterson, and Z. Wang. Codns: Improving dns performance and reliability via cooperative lookups. In In Proceedings of the Sixth Symposium on Operating Systems Design and Implementation (OSDI '04), 2004.
-
K. Park, V. S. Pai, L. Peterson, and Z. Wang. Codns: Improving dns performance and reliability via cooperative lookups. In In Proceedings of the Sixth Symposium on Operating Systems Design and Implementation (OSDI '04), 2004.
-
-
-
-
25
-
-
21844441675
-
The design and implementation of a next generation name service for the internet
-
V. Ramasubramanian and E. Sirer. The design and implementation of a next generation name service for the internet. Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications, pages 331-342, 2004.
-
(2004)
Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications
, pp. 331-342
-
-
Ramasubramanian, V.1
Sirer, E.2
-
27
-
-
84869605227
-
-
S. Stamm, Z. Ramzan, and M. Jakobsson. Drive-by pharming. http://www.cs.indiana.edu/̃sstamin/papers/driveby-pharming.pdf, 2006.
-
S. Stamm, Z. Ramzan, and M. Jakobsson. Drive-by pharming. http://www.cs.indiana.edu/̃sstamin/papers/driveby-pharming.pdf, 2006.
-
-
-
-
29
-
-
70349265722
-
-
US Cert. Vulnerability note vu#457875. http://www.kb.cert.org/vuls/id/ 457875, 2002.
-
US Cert. Vulnerability note vu#457875. http://www.kb.cert.org/vuls/id/ 457875, 2002.
-
-
-
-
31
-
-
58149089037
-
DNS complexity
-
April
-
P. Vixie. DNS complexity. ACM Queue, 5(3), April 2007.
-
(2007)
ACM Queue
, vol.5
, Issue.3
-
-
Vixie, P.1
-
33
-
-
70349296545
-
-
P. Vixie, O. Gudmundsson, D. E. 3rd, and B. Wellington. Secret key transaction authentication for DNS (TSIG). http://tools.ietf.org/html/rfc2845. May 2000.
-
P. Vixie, O. Gudmundsson, D. E. 3rd, and B. Wellington. Secret key transaction authentication for DNS (TSIG). http://tools.ietf.org/html/rfc2845. May 2000.
-
-
-
-
37
-
-
42549110051
-
DoX: A peer-to-peer antidote for DNS cache poisoning attacks
-
June
-
L. Yuan, K. Kant, P. Mohapatra, and C.-N. Chuah. DoX: A peer-to-peer antidote for DNS cache poisoning attacks. In Proceedings of the IEEE International Conference on Communications (ICC'06), volume 5, pages 8164-9547, June 2006.
-
(2006)
Proceedings of the IEEE International Conference on Communications (ICC'06)
, vol.5
, pp. 8164-9547
-
-
Yuan, L.1
Kant, K.2
Mohapatra, P.3
Chuah, C.-N.4
|