Abstract
No abstract available.
RFC Downloads
ZIP
Cited By
- Zhang Y, Zhang M, Liu B, Liu Z, Zhang J, Duan H, Zhang M, Shi F and Xu C Cross the zone Proceedings of the 33rd USENIX Conference on Security Symposium, (5751-5768)
- Sengupta J, Kosek M, Fries J, Ferlin-Reiter S and Bajpai V (2024). On Cross-Layer Interactions of QUIC, Encrypted DNS and HTTP/3: Design, Evaluation, and Dataset, IEEE Transactions on Network and Service Management, 21:3, (2992-3007), Online publication date: 1-Jun-2024.
- Fernandez S, Hureau O, Duda A and Korczynski M WHOIS Right? An Analysis of WHOIS and RDAP Consistency Passive and Active Measurement, (206-231)
- Zhang F, Liu B, Alowaisheq E, Chen J, Lu C, Song L, Ma Y, Liu Y, Duan H and Yang M Silence is not Golden: Disrupting the Load Balancing of Authoritative DNS Servers Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, (296-310)
- Linker F and Basin D ADEM: An Authentic Digital EMblem Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, (2815-2829)
- Bushart J and Rossow C ResolFuzz: Differential Fuzzing of DNS Resolvers Computer Security – ESORICS 2023, (62-80)
- Liu S, Duan H, Heimes L, Bearzi M, Vieli J, Basin D and Perrig A A Formal Framework for End-to-End DNS Resolution Proceedings of the ACM SIGCOMM 2023 Conference, (932-949)
- Fiebig T Crisis, Ethics, Reliability & a measurement.network Proceedings of the 2023 Applied Networking Research Workshop, (44-50)
- Xu C, Zhang Y, Shi F, Ma H, Ding W and Shan H Gushing Resolvers: Measuring Open Resolvers’ Recursive Behavior Proceedings of the 4th International Conference on Advanced Information Science and System, (1-6)
- Sommese R, Claffy K, van Rijswijk-Deij R, Chattopadhyay A, Dainotti A, Sperotto A and Jonker M Investigating the impact of DDoS attacks on DNS infrastructure Proceedings of the 22nd ACM Internet Measurement Conference, (51-64)
- Kosek M, Doan T, Huber S and Bajpai V (2022). Measuring DNS over TCP in the era of increasing DNS response sizes, ACM SIGCOMM Computer Communication Review, 52:2, (44-55), Online publication date: 30-Apr-2022.
- Laprade C and Huang H Domain name service trust delegation in cloud computing Proceedings of the 37th ACM/SIGAPP Symposium on Applied Computing, (13-21)
- Dan O, Parikh V and Davison B (2021). IP Geolocation through Reverse DNS, ACM Transactions on Internet Technology, 22:1, (1-29), Online publication date: 28-Feb-2022.
- Park J, Jang R, Mohaisen M and Mohaisen D (2021). A Large-Scale Behavioral Analysis of the Open DNS Resolvers on the Internet, IEEE/ACM Transactions on Networking, 30:1, (76-89), Online publication date: 1-Feb-2022.
- Kakarla S, Beckett R, Millstein T and Varghese G How Complex is DNS? Proceedings of the 20th ACM Workshop on Hot Topics in Networks, (116-122)
- Vekshin D, Hynek K and Cejka T DoH Insight Proceedings of the 15th International Conference on Availability, Reliability and Security, (1-8)
- Ovadya A, Ogen R, Mallah Y, Gilboa N and Oren Y Cross-router covert channels Proceedings of the 13th USENIX Conference on Offensive Technologies, (2-2)
- Zhauniarovich Y, Khalil I, Yu T and Dacier M (2018). A Survey on Malicious Domains Detection through DNS Data Analysis, ACM Computing Surveys, 51:4, (1-36), Online publication date: 31-Jul-2019.
- Tomic D, Zagar D and Martinovic G (2019). Implementation and efficiency analysis of composite DNS-metric for dynamic server selection, Telecommunications Systems, 71:1, (1-18), Online publication date: 1-May-2019.
- Allman M Comments on DNS Robustness Proceedings of the Internet Measurement Conference 2018, (84-90)
- Moura G, Heidemann J, Müller M, de O. Schmidt R and Davids M When the Dike Breaks Proceedings of the Internet Measurement Conference 2018, (8-21)
- Mwangi X and Sollins K MNDN Proceedings of the 5th ACM Conference on Information-Centric Networking, (117-124)
- Korczynski M, Wullink M, Tajalizadehkhoob S, Moura G, Noroozian A, Bagley D and Hesselman C Cybercrime After the Sunrise Proceedings of the 2018 on Asia Conference on Computer and Communications Security, (609-623)
- Chen S, Jeng T, Huang C, Chen C and Chou K Doctrina Proceedings of the 2017 7th International Conference on Communication and Network Security, (67-75)
- Chung T, van Rijswijk-Deij R, Choffnes D, Levin D, Maggs B, Mislove A and Wilson C Understanding the role of registrars in DNSSEC deployment Proceedings of the 2017 Internet Measurement Conference, (369-383)
- Müller M, Moura G, de O. Schmidt R and Heidemann J Recursives in the wild Proceedings of the 2017 Internet Measurement Conference, (489-495)
- Aertsen M, Korczyński M, Moura G, Tajalizadehkhoob S and van den Berg J No domain left behind Proceedings of the 2017 Applied Networking Research Workshop, (48-54)
- Chen Y, Kintis P, Antonakakis M, Nadji Y, Dagon D and Farrell M (2017). Measuring lower bounds of the financial abuse to online advertisers, Computers and Security, 67:C, (164-180), Online publication date: 1-Jun-2017.
- Radwan M and Heckel R Prediction of the domain name system (DNS) quality attributes Proceedings of the Symposium on Applied Computing, (578-585)
- Korczyński M, Król M and van Eeten M Zone Poisoning Proceedings of the 2016 Internet Measurement Conference, (271-278)
- Kirchler M, Herrmann D, Lindemann J and Kloft M Tracked Without a Trace Proceedings of the 2016 ACM Workshop on Artificial Intelligence and Security, (23-34)
- Anderson B and McGrew D Identifying Encrypted Malware Traffic with Contextual Flow Data Proceedings of the 2016 ACM Workshop on Artificial Intelligence and Security, (35-46)
- Hao S, Kantchelian A, Miller B, Paxson V and Feamster N PREDATOR Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, (1568-1579)
- Chen Y, Kintis P, Antonakakis M, Nadji Y, Dagon D, Lee W and Farrell M Financial Lower Bounds of Online Advertising Abuse Proceedings of the 13th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment - Volume 9721, (231-254)
- Gao H, Yegneswaran V, Jiang J, Chen Y, Porras P, Ghosh S and Duan H (2016). Reexamining DNS from a global recursive resolver perspective, IEEE/ACM Transactions on Networking, 24:1, (43-57), Online publication date: 1-Feb-2016.
- Kieselmann O, Kopal N and Wacker A A Novel Approach to Data Revocation on the Internet Revised Selected Papers of the 10th International Workshop on Data Privacy Management, and Security Assurance - Volume 9481, (134-149)
- Dourish P Not the internet, but this internet Proceedings of The Fifth Decennial Aarhus Conference on Critical Alternatives, (157-168)
- Pieczul O and Foley S The Dark Side of the Code Revised Selected Papers of the 23rd International Workshop on Security Protocols XXIII - Volume 9379, (1-11)
- Quan L, Heidemann J and Pradkin Y When the internet sleeps Proceedings of the 2014 Conference on Internet Measurement Conference, (87-100)
- Wang T, Jang Y, Chen Y, Chung S, Lau B and Lee W On the feasibility of large-scale infections of iOS devices Proceedings of the 23rd USENIX conference on Security Symposium, (79-93)
- Carpenter B (2014). IP addresses considered harmful, ACM SIGCOMM Computer Communication Review, 44:2, (65-69), Online publication date: 8-Apr-2014.
- Jayarathna D, Tupakula U and Varadharajan V Hypervisor-based security architecture for validating DNS services (poster) Proceedings of the Twelfth Australasian Information Security Conference - Volume 149, (83-86)
- Hao S, Thomas M, Paxson V, Feamster N, Kreibich C, Grier C and Hollenbeck S Understanding the domain registration behavior of spammers Proceedings of the 2013 conference on Internet measurement conference, (63-76)
- Gao H, Yegneswaran V, Chen Y, Porras P, Ghosh S, Jiang J and Duan H (2013). An empirical reexamination of global DNS behavior, ACM SIGCOMM Computer Communication Review, 43:4, (267-278), Online publication date: 19-Sep-2013.
- Gao H, Yegneswaran V, Chen Y, Porras P, Ghosh S, Jiang J and Duan H An empirical reexamination of global DNS behavior Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM, (267-278)
- Callahan T, Allman M and Rabinovich M (2013). On modern DNS behavior and properties, ACM SIGCOMM Computer Communication Review, 43:3, (7-15), Online publication date: 1-Jul-2013.
- Dagon D Large-scale DNS data analysis Proceedings of the 2012 ACM conference on Computer and communications security, (1054-1055)
- Chaudhry A, Madhavapeddy A, Rotsos C, Mortier R, Aucinas A, Crowcroft J, Eide S, Hand S, Moore A and Vallina-Rodriguez N (2012). Signposts, ACM SIGCOMM Computer Communication Review, 42:4, (83-84), Online publication date: 24-Sep-2012.
- Sollins K Pervasive persistent identification for information centric networking Proceedings of the second edition of the ICN workshop on Information-centric networking, (1-6)
- Chaudhry A, Madhavapeddy A, Rotsos C, Mortier R, Aucinas A, Crowcroft J, Eide S, Hand S, Moore A and Vallina-Rodriguez N Signposts Proceedings of the ACM SIGCOMM 2012 conference on Applications, technologies, architectures, and protocols for computer communication, (83-84)
- Anonymous (2012). The collateral damage of internet censorship by DNS injection, ACM SIGCOMM Computer Communication Review, 42:3, (21-27), Online publication date: 26-Jun-2012.
- Yu Y, Wessels D, Larson M and Zhang L (2012). Authority server selection in DNS caching resolvers, ACM SIGCOMM Computer Communication Review, 42:2, (80-86), Online publication date: 29-Mar-2012.
- Deccio C, Sedayao J, Kant K and Mohapatra P (2012). Quantifying DNS namespace influence, Computer Networks: The International Journal of Computer and Telecommunications Networking, 56:2, (780-794), Online publication date: 1-Feb-2012.
- Huang T and Chu K (2011). Networking without Dynamic Host Configuration Protocol server in Ethernet and Wireless Local Area Network, Journal of Network and Computer Applications, 34:6, (2027-2041), Online publication date: 1-Nov-2011.
- Xu Q, Migault D, Sénécal S and Francfort S K-means and adaptive k-means algorithms for clustering DNS traffic Proceedings of the 5th International ICST Conference on Performance Evaluation Methodologies and Tools, (281-290)
- Li A, Liu X and Yang X Bootstrapping accountability in the internet we have Proceedings of the 8th USENIX conference on Networked systems design and implementation, (155-168)
- Borkar G, Pund M and Jawade P Implementation of round robin policy in DNS for thresholding of distributed web server system Proceedings of the International Conference & Workshop on Emerging Trends in Technology, (198-201)
- Boucadair M A Multicast-Based Enterprise VoIP Service Architecture Proceedings of the 2nd International Workshop on Future Multimedia Networking, (38-49)
- Costa M, Crowcroft J, Castro M, Rowstron A, Zhou L, Zhang L and Barham P (2008). Vigilante, ACM Transactions on Computer Systems, 26:4, (1-68), Online publication date: 1-Dec-2008.
- Lin J, Ho J, Tseng L and Lai F (2008). Variant Chinese Domain Name Resolution, ACM Transactions on Asian Language Information Processing, 7:4, (1-29), Online publication date: 1-Nov-2008.
- Dagon D, Antonakakis M, Vixie P, Jinmei T and Lee W Increased DNS forgery resistance through 0x20-bit encoding Proceedings of the 15th ACM conference on Computer and communications security, (211-222)
- Costa D and Fialho S MovMedia Proceedings of the 14th Brazilian Symposium on Multimedia and the Web, (107-114)
- Plonka D and Barford P Context-aware clustering of DNS query traffic Proceedings of the 8th ACM SIGCOMM conference on Internet measurement, (217-230)
- Kalafut A, Shue C and Gupta M Understanding implications of DNS zone provisioning Proceedings of the 8th ACM SIGCOMM conference on Internet measurement, (211-216)
- Elz R and Kamolphiwong S Towards universal mobile-IP Proceedings of the International Conference on Mobile Technology, Applications, and Systems, (1-6)
- Tsunoda H, Ohta K, Yamamoto A, Ansari N, Waizumi Y and Nemoto Y (2008). Detecting DRDoS attacks by a simple response packet confirmation mechanism, Computer Communications, 31:14, (3299-3306), Online publication date: 1-Sep-2008.
- Rikitake K, Nakao K, Shimojo S and Nogawa H (2008). UDP Large-Payload Capability Detection for DNSSEC, IEICE - Transactions on Information and Systems, E91-D:5, (1261-1273), Online publication date: 1-May-2008.
- Akcan H, Suel T and Brönnimann H Geographic web usage estimation by monitoring DNS caches Proceedings of the first international workshop on Location and the web, (85-92)
- Shue C, Kalafut A and Gupta M The web is smaller than it seems Proceedings of the 7th ACM SIGCOMM conference on Internet measurement, (123-128)
- Chen X, Wang H, Ren S and Zhang X (2007). Maintaining Strong Cache Consistency for the Domain Name System, IEEE Transactions on Knowledge and Data Engineering, 19:8, (1057-1071), Online publication date: 1-Aug-2007.
- Zhang G, Ehlert S, Magedanz T and Sisalem D Denial of service attack and prevention on SIP VoIP infrastructures using DNS flooding Proceedings of the 1st international conference on Principles, systems and applications of IP telecommunications, (57-66)
- Yi Wu , Tuononen J and Latvala M Performance Analysis of DNS with TTL Value 0 as Location Repository in Mobile Internet Proceedings of the 2007 IEEE Wireless Communications and Networking Conference, (3250-3255)
- Hybinette M, Kraemer E, Xiong Y, Matthews G and Ahmed J SASSY Proceedings of the 38th conference on Winter simulation, (926-933)
- Zhang J and Honeyman P NFSv4 replication for grid storage middleware Proceedings of the 4th international workshop on Middleware for grid computing
- Ford B, Strauss J, Lesniewski-Laas C, Rhea S, Kaashoek F and Morris R Persistent personal names for globally connected mobile devices Proceedings of the 7th symposium on Operating systems design and implementation, (233-248)
- Spence D, Crowcroft J, Hand S and Harris T Location based placement of whole distributed systems Proceedings of the 2005 ACM conference on Emerging network experiment and technology, (124-134)
- Ramasubramanian V and Sirer E Perils of transitive trust in the domain name system Proceedings of the 5th ACM SIGCOMM conference on Internet measurement, (35-35)
- Deegan T, Crowcroft J and Warfield A (2005). The main name system, ACM SIGCOMM Computer Communication Review, 35:5, (5-14), Online publication date: 6-Oct-2005.
- Ahlgren B, Eggert L, Ohlman B, Rajahalme J and Schieder A Names, addresses and identities in ambient networks Proceedings of the 1st ACM workshop on Dynamic interconnection of networks, (33-37)
- Ishibashi K, Toyono T, Toyama K, Ishino M, Ohshima H and Mizukoshi I Detecting mass-mailing worm infected hosts by mining DNS traffic data Proceedings of the 2005 ACM SIGCOMM workshop on Mining network data, (159-164)
- Cohen E, Halperin E and Kaplan H (2005). Performance aspects of distributed caches using, TTL-based consistency, Theoretical Computer Science, 331:1, (73-96), Online publication date: 15-Feb-2005.
- Afergan M and Beverly R (2005). The state of the email address, ACM SIGCOMM Computer Communication Review, 35:1, (29-36), Online publication date: 1-Jan-2005.
- Malone D The root of the matter Proceedings of the 4th ACM SIGCOMM conference on Internet measurement, (15-20)
- Pang J, Hendricks J, Akella A, De Prisco R, Maggs B and Seshan S Availability, usage, and deployment characteristics of the domain name system Proceedings of the 4th ACM SIGCOMM conference on Internet measurement, (1-14)
- Wessels D Is your caching resolver polluting the internet? Proceedings of the ACM SIGCOMM workshop on Network troubleshooting: research, theory and operations practice meet malfunctioning reality, (271-276)
- Pappas V, Fältström P, Massey D and Zhang L Distributed DNS troubleshooting Proceedings of the ACM SIGCOMM workshop on Network troubleshooting: research, theory and operations practice meet malfunctioning reality, (265-270)
- Ramasubramanian V and Sirer E (2004). The design and implementation of a next generation name service for the internet, ACM SIGCOMM Computer Communication Review, 34:4, (331-342), Online publication date: 30-Aug-2004.
- Pappas V, Xu Z, Lu S, Massey D, Terzis A and Zhang L (2004). Impact of configuration errors on DNS robustness, ACM SIGCOMM Computer Communication Review, 34:4, (319-330), Online publication date: 30-Aug-2004.
- Ramasubramanian V and Sirer E The design and implementation of a next generation name service for the internet Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications, (331-342)
- Pappas V, Xu Z, Lu S, Massey D, Terzis A and Zhang L Impact of configuration errors on DNS robustness Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications, (319-330)
- Lindemann C and Waldhorst O (2004). Exploiting epidemic data dissemination for consistent lookup operations in mobile applications, ACM SIGMOBILE Mobile Computing and Communications Review, 8:3, (44-56), Online publication date: 1-Jul-2004.
- Preechaveerakul L and Bhattarakosol P One name—many objects—one result Proceedings of the 2004 international symposium on Information and communication technologies, (63-67)
- Walfish M, Balakrishnan H and Shenker S Untangling the web from DNS Proceedings of the 1st conference on Symposium on Networked Systems Design and Implementation - Volume 1, (17-17)
- References Grid resource management, (507-566)
- Masui T and Takabayashi S Instant group communication with QuickML Proceedings of the 2003 ACM International Conference on Supporting Group Work, (268-273)
- Wills C, Mikhailov M and Shang H Inferring relative popularity of internet applications by actively querying DNS caches Proceedings of the 3rd ACM SIGCOMM conference on Internet measurement, (78-90)
- Sollins K (2003). Designing for scale and differentiation, ACM SIGCOMM Computer Communication Review, 33:4, (267-276), Online publication date: 1-Oct-2003.
- Clark D, Sollins K, Wroclawski J and Faber T (2003). Addressing reality, ACM SIGCOMM Computer Communication Review, 33:4, (247-257), Online publication date: 1-Oct-2003.
- Lindemann C and Waldhorst O Consistency mechanisms for a distributed lookup service supporting mobile applications Proceedings of the 3rd ACM international workshop on Data engineering for wireless and mobile access, (61-68)
- Fischer M and Merritt M (2003). Appraising two decades of distributed computing theory research, Distributed Computing, 16:2-3, (239-247), Online publication date: 1-Sep-2003.
- Sollins K Designing for scale and differentiation Proceedings of the ACM SIGCOMM workshop on Future directions in network architecture, (267-276)
- Clark D, Sollins K, Wroclawski J and Faber T Addressing reality Proceedings of the ACM SIGCOMM workshop on Future directions in network architecture, (247-257)
- Li H and Wang Y Public-key infrastructure Payment technologies for E-commerce, (39-70)
- Liston R, Srinivasan S and Zegura E Diversity in DNS performance measures Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment, (19-31)
- Di Stefano A and Santoro C (2002). Locating Mobile Agents in a Wide Distributed Environment, IEEE Transactions on Parallel and Distributed Systems, 13:8, (844-864), Online publication date: 1-Aug-2002.
- Liu J, Zhang Q, Li B, Zhu W and Zhang J (2002). A unified framework for resource discovery and QoS-aware provider selection in ad hoc networks, ACM SIGMOBILE Mobile Computing and Communications Review, 6:1, (13-21), Online publication date: 1-Jan-2002.
- Heidemann J, Silva F, Intanagonwiwat C, Govindan R, Estrin D and Ganesan D (2001). Building efficient wireless sensor networks with low-level naming, ACM SIGOPS Operating Systems Review, 35:5, (146-159), Online publication date: 1-Dec-2001.
- Ateniese G and Mangard S A new approach to DNS security (DNSSEC) Proceedings of the 8th ACM conference on Computer and Communications Security, (86-95)
- Jung J, Sit E, Balakrishnan H and Morris R DNS performance and the effectiveness of caching Proceedings of the 1st ACM SIGCOMM Workshop on Internet measurement, (153-167)
- Heidemann J, Silva F, Intanagonwiwat C, Govindan R, Estrin D and Ganesan D Building efficient wireless sensor networks with low-level naming Proceedings of the eighteenth ACM symposium on Operating systems principles, (146-159)
- Antonopoulos N and Shafarenko A (2001). An Active Organisation System for Customised, Secure Agent Discovery, The Journal of Supercomputing, 20:1, (5-35), Online publication date: 1-Aug-2001.
- Carpenter T, Carter R, Cochinwala M and Eiger M (2001). Client-Server Caching with Expiration Timestamps, Distributed and Parallel Databases, 10:1, (5-22), Online publication date: 1-Jul-2001.
- Cheng P (2001). An architecture for the internet key exchange protocol, IBM Systems Journal, 40:3, (721-746), Online publication date: 1-Mar-2001.
- Tzagarakis M, Karousos N, Christodoulakis D and Reich S Naming as a fundamental concept of open hypermedia systems Proceedings of the eleventh ACM on Hypertext and hypermedia, (103-112)
- Yang C and Luo M Efficient support for content-based routing in web server clusters Proceedings of the 2nd conference on USENIX Symposium on Internet Technologies and Systems - Volume 2, (20-20)
- Zao J, Gahm J, Troxel G, Condell M, Helinek P, Yuan N, Castineyra I and Kent S (1999). A public-key based secure mobile IP, Wireless Networks, 5:5, (373-390), Online publication date: 1-Oct-1999.
- Macaire A and Carlier D A personal naming and directory service for mobile internet users Proceedings of the USENIX Workshop on Smartcard Technology on USENIX Workshop on Smartcard Technology, (16-16)
- Macaire A and Carlier D A Personal Naming and Directory Service for UMTS Users Proceedings of the 6th International Conference on Intelligence and Services in Networks: Paving the Way for an Open Service Market, (250-262)
- Grubb M and Carter R Single Sign-On and the System Administrator Proceedings of the 12th USENIX conference on System administration, (63-86)
- Pansiot J and Grad D (1998). On routes and multicast trees in the Internet, ACM SIGCOMM Computer Communication Review, 28:1, (41-50), Online publication date: 1-Jan-1998.
- Perkins C (1998). Mobile Networking Through Mobile IP, IEEE Internet Computing, 2:1, (58-69), Online publication date: 1-Jan-1998.
- Paul S, Park E and Chaar J RainMan Proceedings of the USENIX Symposium on Internet Technologies and Systems on USENIX Symposium on Internet Technologies and Systems, (15-15)
- Zao J, Kent S, Gahm J, Troxel G, Condell M, Helinek P, Yuan N and Castineyra I A public-key based secure mobile IP Proceedings of the 3rd annual ACM/IEEE international conference on Mobile computing and networking, (173-184)
- Eickler A, Kemper A and Kossmann D Finding Data in the Neighborhood Proceedings of the 23rd International Conference on Very Large Data Bases, (336-345)
- Maltzahn C, Richardson K and Grunwald D (1997). Performance issues of enterprise level web proxies, ACM SIGMETRICS Performance Evaluation Review, 25:1, (13-23), Online publication date: 1-Jun-1997.
- Maltzahn C, Richardson K and Grunwald D Performance issues of enterprise level web proxies Proceedings of the 1997 ACM SIGMETRICS international conference on Measurement and modeling of computer systems, (13-23)
- Cheshire S and Baker M (1996). Internet mobility 4×4, ACM SIGCOMM Computer Communication Review, 26:4, (318-329), Online publication date: 1-Oct-1996.
- Cheshire S and Baker M Internet mobility 4×4 Conference proceedings on Applications, technologies, architectures, and protocols for computer communications, (318-329)
- Galvin J Public Key distribution with secure DNS Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6, (16-16)
- Ylönen T SSH Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6, (4-4)
- Cheswick B and Bellovin S A DNS filter and switch for packet-filtering gateways Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6, (2-2)
- Weiss R, Vélez B and Sheldon M HyPursuit Proceedings of the the seventh ACM conference on Hypertext, (180-193)
- Baker M, Zhao X, Cheshire S and Stone J Supporting mobility in MosquitoNet Proceedings of the 1996 annual conference on USENIX Annual Technical Conference, (11-11)
- Eickler A, Gerlhof C and Kossmann D A Performance Evaluation of OID Mapping Techniques Proceedings of the 21th International Conference on Very Large Data Bases, (18-29)
- Perkins C and Luo K (1995). Using DHCP with computers that move0, Wireless Networks, 1:3, (341-353), Online publication date: 1-Aug-1995.
- Schönwälder J and Langendörfer H Tcl extensions for network management applications Proceedings of the 3rd Annual USENIX Workshop on Tcl/Tk - Volume 3, (30-30)
- Bellovin S Using the domain name system for system break-ins Proceedings of the 5th conference on USENIX UNIX Security Symposium - Volume 5, (18-18)
- Kim G, Orman H and O'Malley S Implementing a secure rlogin environment Proceedings of the 5th conference on USENIX UNIX Security Symposium - Volume 5, (7-7)
- Francis P and Govindan R (1994). Flexible routing and addressing for a next generation IP, ACM SIGCOMM Computer Communication Review, 24:4, (116-125), Online publication date: 1-Oct-1994.
- Francis P and Govindan R Flexible routing and addressing for a next generation IP Proceedings of the conference on Communications architectures, protocols and applications, (116-125)
- Bowman C, Danzig P, Manber U and Schwartz M (1994). Scalable Internet resource discovery, Communications of the ACM, 37:8, (98-ff.), Online publication date: 1-Aug-1994.
- Schwartz M and Wood D (1993). Discovering shared interests using graph analysis, Communications of the ACM, 36:8, (78-89), Online publication date: 1-Aug-1993.
- Bellovin S (1993). Packets found on an internet, ACM SIGCOMM Computer Communication Review, 23:3, (26-31), Online publication date: 1-Jul-1993.
- Ordille J and Miller B (1993). Database challenges in global information systems, ACM SIGMOD Record, 22:2, (403-407), Online publication date: 1-Jun-1993.
- Ordille J and Miller B Database challenges in global information systems Proceedings of the 1993 ACM SIGMOD international conference on Management of data, (403-407)
- Teraoka F and Tokoro M (1993). Host migration transparency in IP networks, ACM SIGCOMM Computer Communication Review, 23:1, (45-65), Online publication date: 3-Jan-1993.
- Danzig P, Obraczka K and Kumar A (1992). An analysis of wide-area name server traffic, ACM SIGCOMM Computer Communication Review, 22:4, (281-292), Online publication date: 1-Oct-1992.
- Danzig P, Obraczka K and Kumar A An analysis of wide-area name server traffic Conference proceedings on Communications architectures & protocols, (281-292)
- Shaheen-Gouda A and Loucks L Name borders Proceedings of the 5th workshop on ACM SIGOPS European workshop: Models and paradigms for distributed systems structuring, (1-6)
- Znati T and Molka J A simulation based analysis of naming schemes for distributed systems Proceedings of the 25th annual symposium on Simulation, (42-51)
- Teraoka F, Yokore Y and Tokoro M (1991). A network architecture providing host migration transparency, ACM SIGCOMM Computer Communication Review, 21:4, (209-220), Online publication date: 1-Aug-1991.
- Ordille J and Miller B (1991). Nomenclator descriptive query optimization for large X.500 environments, ACM SIGCOMM Computer Communication Review, 21:4, (185-196), Online publication date: 1-Aug-1991.
- Teraoka F, Yokore Y and Tokoro M A network architecture providing host migration transparency Proceedings of the conference on Communications architecture & protocols, (209-220)
- Ordille J and Miller B Nomenclator descriptive query optimization for large X.500 environments Proceedings of the conference on Communications architecture & protocols, (185-196)
- Comer D and Droms R (1990). Uniform access to Internet directory services, ACM SIGCOMM Computer Communication Review, 20:4, (50-59), Online publication date: 1-Aug-1990.
- Comer D and Droms R Uniform access to Internet directory services Proceedings of the ACM symposium on Communications architectures & protocols, (50-59)
- Mills D (1989). On the Accuracy and Stablility of Clocks Synchronized by the Network Time Protocol in the Internet System, ACM SIGCOMM Computer Communication Review, 20:1, (65-75), Online publication date: 1-Dec-1989.
- Gray C and Cheriton D (1989). Leases: an efficient fault-tolerant mechanism for distributed file cache consistency, ACM SIGOPS Operating Systems Review, 23:5, (202-210), Online publication date: 1-Nov-1989.
- Gray C and Cheriton D Leases: an efficient fault-tolerant mechanism for distributed file cache consistency Proceedings of the twelfth ACM symposium on Operating systems principles, (202-210)
- Libes D (1989). Viewpoint, Communications of the ACM, 32:11, (1289-1291), Online publication date: 1-Nov-1989.
- Mockapetris P and Dunlap K (1988). Development of the domain name system, ACM SIGCOMM Computer Communication Review, 18:4, (123-133), Online publication date: 1-Aug-1988.
- Mockapetris P and Dunlap K Development of the domain name system Symposium proceedings on Communications architectures and protocols, (123-133)
Recommendations
Arabic domain names
SEPADS'06: Proceedings of the 5th WSEAS International Conference on Software Engineering, Parallel and Distributed SystemsDomain names are a very crucial part of applied Internet technology. To this day, they remain dependent upon Latin characters regardless of the global reach of the Internet itself. Other languages are not yet fully supported to locate resources and ...