skip to main content
RFC1034: Domain names - concepts and facilities1987 RFC
Reflects downloads up to 05 Jan 2025Bibliometrics
Abstract

No abstract available.

RFC Downloads

Cited By

  1. Zhang Y, Zhang M, Liu B, Liu Z, Zhang J, Duan H, Zhang M, Shi F and Xu C Cross the zone Proceedings of the 33rd USENIX Conference on Security Symposium, (5751-5768)
  2. Sengupta J, Kosek M, Fries J, Ferlin-Reiter S and Bajpai V (2024). On Cross-Layer Interactions of QUIC, Encrypted DNS and HTTP/3: Design, Evaluation, and Dataset, IEEE Transactions on Network and Service Management, 21:3, (2992-3007), Online publication date: 1-Jun-2024.
  3. Fernandez S, Hureau O, Duda A and Korczynski M WHOIS Right? An Analysis of WHOIS and RDAP Consistency Passive and Active Measurement, (206-231)
  4. ACM
    Zhang F, Liu B, Alowaisheq E, Chen J, Lu C, Song L, Ma Y, Liu Y, Duan H and Yang M Silence is not Golden: Disrupting the Load Balancing of Authoritative DNS Servers Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, (296-310)
  5. ACM
    Linker F and Basin D ADEM: An Authentic Digital EMblem Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, (2815-2829)
  6. Bushart J and Rossow C ResolFuzz: Differential Fuzzing of DNS Resolvers Computer Security – ESORICS 2023, (62-80)
  7. ACM
    Liu S, Duan H, Heimes L, Bearzi M, Vieli J, Basin D and Perrig A A Formal Framework for End-to-End DNS Resolution Proceedings of the ACM SIGCOMM 2023 Conference, (932-949)
  8. ACM
    Fiebig T Crisis, Ethics, Reliability & a measurement.network Proceedings of the 2023 Applied Networking Research Workshop, (44-50)
  9. ACM
    Xu C, Zhang Y, Shi F, Ma H, Ding W and Shan H Gushing Resolvers: Measuring Open Resolvers’ Recursive Behavior Proceedings of the 4th International Conference on Advanced Information Science and System, (1-6)
  10. ACM
    Sommese R, Claffy K, van Rijswijk-Deij R, Chattopadhyay A, Dainotti A, Sperotto A and Jonker M Investigating the impact of DDoS attacks on DNS infrastructure Proceedings of the 22nd ACM Internet Measurement Conference, (51-64)
  11. ACM
    Kosek M, Doan T, Huber S and Bajpai V (2022). Measuring DNS over TCP in the era of increasing DNS response sizes, ACM SIGCOMM Computer Communication Review, 52:2, (44-55), Online publication date: 30-Apr-2022.
  12. ACM
    Laprade C and Huang H Domain name service trust delegation in cloud computing Proceedings of the 37th ACM/SIGAPP Symposium on Applied Computing, (13-21)
  13. ACM
    Dan O, Parikh V and Davison B (2021). IP Geolocation through Reverse DNS, ACM Transactions on Internet Technology, 22:1, (1-29), Online publication date: 28-Feb-2022.
  14. Park J, Jang R, Mohaisen M and Mohaisen D (2021). A Large-Scale Behavioral Analysis of the Open DNS Resolvers on the Internet, IEEE/ACM Transactions on Networking, 30:1, (76-89), Online publication date: 1-Feb-2022.
  15. ACM
    Kakarla S, Beckett R, Millstein T and Varghese G How Complex is DNS? Proceedings of the 20th ACM Workshop on Hot Topics in Networks, (116-122)
  16. ACM
    Vekshin D, Hynek K and Cejka T DoH Insight Proceedings of the 15th International Conference on Availability, Reliability and Security, (1-8)
  17. Ovadya A, Ogen R, Mallah Y, Gilboa N and Oren Y Cross-router covert channels Proceedings of the 13th USENIX Conference on Offensive Technologies, (2-2)
  18. ACM
    Zhauniarovich Y, Khalil I, Yu T and Dacier M (2018). A Survey on Malicious Domains Detection through DNS Data Analysis, ACM Computing Surveys, 51:4, (1-36), Online publication date: 31-Jul-2019.
  19. Tomic D, Zagar D and Martinovic G (2019). Implementation and efficiency analysis of composite DNS-metric for dynamic server selection, Telecommunications Systems, 71:1, (1-18), Online publication date: 1-May-2019.
  20. ACM
    Allman M Comments on DNS Robustness Proceedings of the Internet Measurement Conference 2018, (84-90)
  21. ACM
    Moura G, Heidemann J, Müller M, de O. Schmidt R and Davids M When the Dike Breaks Proceedings of the Internet Measurement Conference 2018, (8-21)
  22. ACM
    Mwangi X and Sollins K MNDN Proceedings of the 5th ACM Conference on Information-Centric Networking, (117-124)
  23. ACM
    Korczynski M, Wullink M, Tajalizadehkhoob S, Moura G, Noroozian A, Bagley D and Hesselman C Cybercrime After the Sunrise Proceedings of the 2018 on Asia Conference on Computer and Communications Security, (609-623)
  24. ACM
    Chen S, Jeng T, Huang C, Chen C and Chou K Doctrina Proceedings of the 2017 7th International Conference on Communication and Network Security, (67-75)
  25. ACM
    Chung T, van Rijswijk-Deij R, Choffnes D, Levin D, Maggs B, Mislove A and Wilson C Understanding the role of registrars in DNSSEC deployment Proceedings of the 2017 Internet Measurement Conference, (369-383)
  26. ACM
    Müller M, Moura G, de O. Schmidt R and Heidemann J Recursives in the wild Proceedings of the 2017 Internet Measurement Conference, (489-495)
  27. ACM
    Aertsen M, Korczyński M, Moura G, Tajalizadehkhoob S and van den Berg J No domain left behind Proceedings of the 2017 Applied Networking Research Workshop, (48-54)
  28. Chen Y, Kintis P, Antonakakis M, Nadji Y, Dagon D and Farrell M (2017). Measuring lower bounds of the financial abuse to online advertisers, Computers and Security, 67:C, (164-180), Online publication date: 1-Jun-2017.
  29. ACM
    Radwan M and Heckel R Prediction of the domain name system (DNS) quality attributes Proceedings of the Symposium on Applied Computing, (578-585)
  30. ACM
    Korczyński M, Król M and van Eeten M Zone Poisoning Proceedings of the 2016 Internet Measurement Conference, (271-278)
  31. ACM
    Kirchler M, Herrmann D, Lindemann J and Kloft M Tracked Without a Trace Proceedings of the 2016 ACM Workshop on Artificial Intelligence and Security, (23-34)
  32. ACM
    Anderson B and McGrew D Identifying Encrypted Malware Traffic with Contextual Flow Data Proceedings of the 2016 ACM Workshop on Artificial Intelligence and Security, (35-46)
  33. ACM
    Hao S, Kantchelian A, Miller B, Paxson V and Feamster N PREDATOR Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, (1568-1579)
  34. Chen Y, Kintis P, Antonakakis M, Nadji Y, Dagon D, Lee W and Farrell M Financial Lower Bounds of Online Advertising Abuse Proceedings of the 13th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment - Volume 9721, (231-254)
  35. Gao H, Yegneswaran V, Jiang J, Chen Y, Porras P, Ghosh S and Duan H (2016). Reexamining DNS from a global recursive resolver perspective, IEEE/ACM Transactions on Networking, 24:1, (43-57), Online publication date: 1-Feb-2016.
  36. Kieselmann O, Kopal N and Wacker A A Novel Approach to Data Revocation on the Internet Revised Selected Papers of the 10th International Workshop on Data Privacy Management, and Security Assurance - Volume 9481, (134-149)
  37. Dourish P Not the internet, but this internet Proceedings of The Fifth Decennial Aarhus Conference on Critical Alternatives, (157-168)
  38. Pieczul O and Foley S The Dark Side of the Code Revised Selected Papers of the 23rd International Workshop on Security Protocols XXIII - Volume 9379, (1-11)
  39. ACM
    Quan L, Heidemann J and Pradkin Y When the internet sleeps Proceedings of the 2014 Conference on Internet Measurement Conference, (87-100)
  40. Wang T, Jang Y, Chen Y, Chung S, Lau B and Lee W On the feasibility of large-scale infections of iOS devices Proceedings of the 23rd USENIX conference on Security Symposium, (79-93)
  41. ACM
    Carpenter B (2014). IP addresses considered harmful, ACM SIGCOMM Computer Communication Review, 44:2, (65-69), Online publication date: 8-Apr-2014.
  42. Jayarathna D, Tupakula U and Varadharajan V Hypervisor-based security architecture for validating DNS services (poster) Proceedings of the Twelfth Australasian Information Security Conference - Volume 149, (83-86)
  43. ACM
    Hao S, Thomas M, Paxson V, Feamster N, Kreibich C, Grier C and Hollenbeck S Understanding the domain registration behavior of spammers Proceedings of the 2013 conference on Internet measurement conference, (63-76)
  44. ACM
    Gao H, Yegneswaran V, Chen Y, Porras P, Ghosh S, Jiang J and Duan H (2013). An empirical reexamination of global DNS behavior, ACM SIGCOMM Computer Communication Review, 43:4, (267-278), Online publication date: 19-Sep-2013.
  45. ACM
    Gao H, Yegneswaran V, Chen Y, Porras P, Ghosh S, Jiang J and Duan H An empirical reexamination of global DNS behavior Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM, (267-278)
  46. ACM
    Callahan T, Allman M and Rabinovich M (2013). On modern DNS behavior and properties, ACM SIGCOMM Computer Communication Review, 43:3, (7-15), Online publication date: 1-Jul-2013.
  47. ACM
    Dagon D Large-scale DNS data analysis Proceedings of the 2012 ACM conference on Computer and communications security, (1054-1055)
  48. ACM
    Chaudhry A, Madhavapeddy A, Rotsos C, Mortier R, Aucinas A, Crowcroft J, Eide S, Hand S, Moore A and Vallina-Rodriguez N (2012). Signposts, ACM SIGCOMM Computer Communication Review, 42:4, (83-84), Online publication date: 24-Sep-2012.
  49. ACM
    Sollins K Pervasive persistent identification for information centric networking Proceedings of the second edition of the ICN workshop on Information-centric networking, (1-6)
  50. ACM
    Chaudhry A, Madhavapeddy A, Rotsos C, Mortier R, Aucinas A, Crowcroft J, Eide S, Hand S, Moore A and Vallina-Rodriguez N Signposts Proceedings of the ACM SIGCOMM 2012 conference on Applications, technologies, architectures, and protocols for computer communication, (83-84)
  51. ACM
    Anonymous (2012). The collateral damage of internet censorship by DNS injection, ACM SIGCOMM Computer Communication Review, 42:3, (21-27), Online publication date: 26-Jun-2012.
  52. ACM
    Yu Y, Wessels D, Larson M and Zhang L (2012). Authority server selection in DNS caching resolvers, ACM SIGCOMM Computer Communication Review, 42:2, (80-86), Online publication date: 29-Mar-2012.
  53. Deccio C, Sedayao J, Kant K and Mohapatra P (2012). Quantifying DNS namespace influence, Computer Networks: The International Journal of Computer and Telecommunications Networking, 56:2, (780-794), Online publication date: 1-Feb-2012.
  54. Huang T and Chu K (2011). Networking without Dynamic Host Configuration Protocol server in Ethernet and Wireless Local Area Network, Journal of Network and Computer Applications, 34:6, (2027-2041), Online publication date: 1-Nov-2011.
  55. Xu Q, Migault D, Sénécal S and Francfort S K-means and adaptive k-means algorithms for clustering DNS traffic Proceedings of the 5th International ICST Conference on Performance Evaluation Methodologies and Tools, (281-290)
  56. Li A, Liu X and Yang X Bootstrapping accountability in the internet we have Proceedings of the 8th USENIX conference on Networked systems design and implementation, (155-168)
  57. ACM
    Borkar G, Pund M and Jawade P Implementation of round robin policy in DNS for thresholding of distributed web server system Proceedings of the International Conference & Workshop on Emerging Trends in Technology, (198-201)
  58. Boucadair M A Multicast-Based Enterprise VoIP Service Architecture Proceedings of the 2nd International Workshop on Future Multimedia Networking, (38-49)
  59. ACM
    Costa M, Crowcroft J, Castro M, Rowstron A, Zhou L, Zhang L and Barham P (2008). Vigilante, ACM Transactions on Computer Systems, 26:4, (1-68), Online publication date: 1-Dec-2008.
  60. ACM
    Lin J, Ho J, Tseng L and Lai F (2008). Variant Chinese Domain Name Resolution, ACM Transactions on Asian Language Information Processing, 7:4, (1-29), Online publication date: 1-Nov-2008.
  61. ACM
    Dagon D, Antonakakis M, Vixie P, Jinmei T and Lee W Increased DNS forgery resistance through 0x20-bit encoding Proceedings of the 15th ACM conference on Computer and communications security, (211-222)
  62. ACM
    Costa D and Fialho S MovMedia Proceedings of the 14th Brazilian Symposium on Multimedia and the Web, (107-114)
  63. ACM
    Plonka D and Barford P Context-aware clustering of DNS query traffic Proceedings of the 8th ACM SIGCOMM conference on Internet measurement, (217-230)
  64. ACM
    Kalafut A, Shue C and Gupta M Understanding implications of DNS zone provisioning Proceedings of the 8th ACM SIGCOMM conference on Internet measurement, (211-216)
  65. ACM
    Elz R and Kamolphiwong S Towards universal mobile-IP Proceedings of the International Conference on Mobile Technology, Applications, and Systems, (1-6)
  66. Tsunoda H, Ohta K, Yamamoto A, Ansari N, Waizumi Y and Nemoto Y (2008). Detecting DRDoS attacks by a simple response packet confirmation mechanism, Computer Communications, 31:14, (3299-3306), Online publication date: 1-Sep-2008.
  67. Rikitake K, Nakao K, Shimojo S and Nogawa H (2008). UDP Large-Payload Capability Detection for DNSSEC, IEICE - Transactions on Information and Systems, E91-D:5, (1261-1273), Online publication date: 1-May-2008.
  68. ACM
    Akcan H, Suel T and Brönnimann H Geographic web usage estimation by monitoring DNS caches Proceedings of the first international workshop on Location and the web, (85-92)
  69. ACM
    Shue C, Kalafut A and Gupta M The web is smaller than it seems Proceedings of the 7th ACM SIGCOMM conference on Internet measurement, (123-128)
  70. Chen X, Wang H, Ren S and Zhang X (2007). Maintaining Strong Cache Consistency for the Domain Name System, IEEE Transactions on Knowledge and Data Engineering, 19:8, (1057-1071), Online publication date: 1-Aug-2007.
  71. ACM
    Zhang G, Ehlert S, Magedanz T and Sisalem D Denial of service attack and prevention on SIP VoIP infrastructures using DNS flooding Proceedings of the 1st international conference on Principles, systems and applications of IP telecommunications, (57-66)
  72. Yi Wu , Tuononen J and Latvala M Performance Analysis of DNS with TTL Value 0 as Location Repository in Mobile Internet Proceedings of the 2007 IEEE Wireless Communications and Networking Conference, (3250-3255)
  73. Hybinette M, Kraemer E, Xiong Y, Matthews G and Ahmed J SASSY Proceedings of the 38th conference on Winter simulation, (926-933)
  74. ACM
    Zhang J and Honeyman P NFSv4 replication for grid storage middleware Proceedings of the 4th international workshop on Middleware for grid computing
  75. Ford B, Strauss J, Lesniewski-Laas C, Rhea S, Kaashoek F and Morris R Persistent personal names for globally connected mobile devices Proceedings of the 7th symposium on Operating systems design and implementation, (233-248)
  76. ACM
    Spence D, Crowcroft J, Hand S and Harris T Location based placement of whole distributed systems Proceedings of the 2005 ACM conference on Emerging network experiment and technology, (124-134)
  77. Ramasubramanian V and Sirer E Perils of transitive trust in the domain name system Proceedings of the 5th ACM SIGCOMM conference on Internet measurement, (35-35)
  78. ACM
    Deegan T, Crowcroft J and Warfield A (2005). The main name system, ACM SIGCOMM Computer Communication Review, 35:5, (5-14), Online publication date: 6-Oct-2005.
  79. ACM
    Ahlgren B, Eggert L, Ohlman B, Rajahalme J and Schieder A Names, addresses and identities in ambient networks Proceedings of the 1st ACM workshop on Dynamic interconnection of networks, (33-37)
  80. ACM
    Ishibashi K, Toyono T, Toyama K, Ishino M, Ohshima H and Mizukoshi I Detecting mass-mailing worm infected hosts by mining DNS traffic data Proceedings of the 2005 ACM SIGCOMM workshop on Mining network data, (159-164)
  81. Cohen E, Halperin E and Kaplan H (2005). Performance aspects of distributed caches using, TTL-based consistency, Theoretical Computer Science, 331:1, (73-96), Online publication date: 15-Feb-2005.
  82. ACM
    Afergan M and Beverly R (2005). The state of the email address, ACM SIGCOMM Computer Communication Review, 35:1, (29-36), Online publication date: 1-Jan-2005.
  83. ACM
    Malone D The root of the matter Proceedings of the 4th ACM SIGCOMM conference on Internet measurement, (15-20)
  84. ACM
    Pang J, Hendricks J, Akella A, De Prisco R, Maggs B and Seshan S Availability, usage, and deployment characteristics of the domain name system Proceedings of the 4th ACM SIGCOMM conference on Internet measurement, (1-14)
  85. ACM
    Wessels D Is your caching resolver polluting the internet? Proceedings of the ACM SIGCOMM workshop on Network troubleshooting: research, theory and operations practice meet malfunctioning reality, (271-276)
  86. ACM
    Pappas V, Fältström P, Massey D and Zhang L Distributed DNS troubleshooting Proceedings of the ACM SIGCOMM workshop on Network troubleshooting: research, theory and operations practice meet malfunctioning reality, (265-270)
  87. ACM
    Ramasubramanian V and Sirer E (2004). The design and implementation of a next generation name service for the internet, ACM SIGCOMM Computer Communication Review, 34:4, (331-342), Online publication date: 30-Aug-2004.
  88. ACM
    Pappas V, Xu Z, Lu S, Massey D, Terzis A and Zhang L (2004). Impact of configuration errors on DNS robustness, ACM SIGCOMM Computer Communication Review, 34:4, (319-330), Online publication date: 30-Aug-2004.
  89. ACM
    Ramasubramanian V and Sirer E The design and implementation of a next generation name service for the internet Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications, (331-342)
  90. ACM
    Pappas V, Xu Z, Lu S, Massey D, Terzis A and Zhang L Impact of configuration errors on DNS robustness Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications, (319-330)
  91. ACM
    Lindemann C and Waldhorst O (2004). Exploiting epidemic data dissemination for consistent lookup operations in mobile applications, ACM SIGMOBILE Mobile Computing and Communications Review, 8:3, (44-56), Online publication date: 1-Jul-2004.
  92. Preechaveerakul L and Bhattarakosol P One name—many objects—one result Proceedings of the 2004 international symposium on Information and communication technologies, (63-67)
  93. Walfish M, Balakrishnan H and Shenker S Untangling the web from DNS Proceedings of the 1st conference on Symposium on Networked Systems Design and Implementation - Volume 1, (17-17)
  94. References Grid resource management, (507-566)
  95. ACM
    Masui T and Takabayashi S Instant group communication with QuickML Proceedings of the 2003 ACM International Conference on Supporting Group Work, (268-273)
  96. ACM
    Wills C, Mikhailov M and Shang H Inferring relative popularity of internet applications by actively querying DNS caches Proceedings of the 3rd ACM SIGCOMM conference on Internet measurement, (78-90)
  97. ACM
    Sollins K (2003). Designing for scale and differentiation, ACM SIGCOMM Computer Communication Review, 33:4, (267-276), Online publication date: 1-Oct-2003.
  98. ACM
    Clark D, Sollins K, Wroclawski J and Faber T (2003). Addressing reality, ACM SIGCOMM Computer Communication Review, 33:4, (247-257), Online publication date: 1-Oct-2003.
  99. ACM
    Lindemann C and Waldhorst O Consistency mechanisms for a distributed lookup service supporting mobile applications Proceedings of the 3rd ACM international workshop on Data engineering for wireless and mobile access, (61-68)
  100. Fischer M and Merritt M (2003). Appraising two decades of distributed computing theory research, Distributed Computing, 16:2-3, (239-247), Online publication date: 1-Sep-2003.
  101. ACM
    Sollins K Designing for scale and differentiation Proceedings of the ACM SIGCOMM workshop on Future directions in network architecture, (267-276)
  102. ACM
    Clark D, Sollins K, Wroclawski J and Faber T Addressing reality Proceedings of the ACM SIGCOMM workshop on Future directions in network architecture, (247-257)
  103. Li H and Wang Y Public-key infrastructure Payment technologies for E-commerce, (39-70)
  104. ACM
    Liston R, Srinivasan S and Zegura E Diversity in DNS performance measures Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment, (19-31)
  105. Di Stefano A and Santoro C (2002). Locating Mobile Agents in a Wide Distributed Environment, IEEE Transactions on Parallel and Distributed Systems, 13:8, (844-864), Online publication date: 1-Aug-2002.
  106. ACM
    Liu J, Zhang Q, Li B, Zhu W and Zhang J (2002). A unified framework for resource discovery and QoS-aware provider selection in ad hoc networks, ACM SIGMOBILE Mobile Computing and Communications Review, 6:1, (13-21), Online publication date: 1-Jan-2002.
  107. ACM
    Heidemann J, Silva F, Intanagonwiwat C, Govindan R, Estrin D and Ganesan D (2001). Building efficient wireless sensor networks with low-level naming, ACM SIGOPS Operating Systems Review, 35:5, (146-159), Online publication date: 1-Dec-2001.
  108. ACM
    Ateniese G and Mangard S A new approach to DNS security (DNSSEC) Proceedings of the 8th ACM conference on Computer and Communications Security, (86-95)
  109. ACM
    Jung J, Sit E, Balakrishnan H and Morris R DNS performance and the effectiveness of caching Proceedings of the 1st ACM SIGCOMM Workshop on Internet measurement, (153-167)
  110. ACM
    Heidemann J, Silva F, Intanagonwiwat C, Govindan R, Estrin D and Ganesan D Building efficient wireless sensor networks with low-level naming Proceedings of the eighteenth ACM symposium on Operating systems principles, (146-159)
  111. Antonopoulos N and Shafarenko A (2001). An Active Organisation System for Customised, Secure Agent Discovery, The Journal of Supercomputing, 20:1, (5-35), Online publication date: 1-Aug-2001.
  112. Carpenter T, Carter R, Cochinwala M and Eiger M (2001). Client-Server Caching with Expiration Timestamps, Distributed and Parallel Databases, 10:1, (5-22), Online publication date: 1-Jul-2001.
  113. Cheng P (2001). An architecture for the internet key exchange protocol, IBM Systems Journal, 40:3, (721-746), Online publication date: 1-Mar-2001.
  114. ACM
    Tzagarakis M, Karousos N, Christodoulakis D and Reich S Naming as a fundamental concept of open hypermedia systems Proceedings of the eleventh ACM on Hypertext and hypermedia, (103-112)
  115. Yang C and Luo M Efficient support for content-based routing in web server clusters Proceedings of the 2nd conference on USENIX Symposium on Internet Technologies and Systems - Volume 2, (20-20)
  116. Zao J, Gahm J, Troxel G, Condell M, Helinek P, Yuan N, Castineyra I and Kent S (1999). A public-key based secure mobile IP, Wireless Networks, 5:5, (373-390), Online publication date: 1-Oct-1999.
  117. Macaire A and Carlier D A personal naming and directory service for mobile internet users Proceedings of the USENIX Workshop on Smartcard Technology on USENIX Workshop on Smartcard Technology, (16-16)
  118. Macaire A and Carlier D A Personal Naming and Directory Service for UMTS Users Proceedings of the 6th International Conference on Intelligence and Services in Networks: Paving the Way for an Open Service Market, (250-262)
  119. Grubb M and Carter R Single Sign-On and the System Administrator Proceedings of the 12th USENIX conference on System administration, (63-86)
  120. ACM
    Pansiot J and Grad D (1998). On routes and multicast trees in the Internet, ACM SIGCOMM Computer Communication Review, 28:1, (41-50), Online publication date: 1-Jan-1998.
  121. Perkins C (1998). Mobile Networking Through Mobile IP, IEEE Internet Computing, 2:1, (58-69), Online publication date: 1-Jan-1998.
  122. Paul S, Park E and Chaar J RainMan Proceedings of the USENIX Symposium on Internet Technologies and Systems on USENIX Symposium on Internet Technologies and Systems, (15-15)
  123. ACM
    Zao J, Kent S, Gahm J, Troxel G, Condell M, Helinek P, Yuan N and Castineyra I A public-key based secure mobile IP Proceedings of the 3rd annual ACM/IEEE international conference on Mobile computing and networking, (173-184)
  124. Eickler A, Kemper A and Kossmann D Finding Data in the Neighborhood Proceedings of the 23rd International Conference on Very Large Data Bases, (336-345)
  125. ACM
    Maltzahn C, Richardson K and Grunwald D (1997). Performance issues of enterprise level web proxies, ACM SIGMETRICS Performance Evaluation Review, 25:1, (13-23), Online publication date: 1-Jun-1997.
  126. ACM
    Maltzahn C, Richardson K and Grunwald D Performance issues of enterprise level web proxies Proceedings of the 1997 ACM SIGMETRICS international conference on Measurement and modeling of computer systems, (13-23)
  127. ACM
    Cheshire S and Baker M (1996). Internet mobility 4×4, ACM SIGCOMM Computer Communication Review, 26:4, (318-329), Online publication date: 1-Oct-1996.
  128. ACM
    Cheshire S and Baker M Internet mobility 4×4 Conference proceedings on Applications, technologies, architectures, and protocols for computer communications, (318-329)
  129. Galvin J Public Key distribution with secure DNS Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6, (16-16)
  130. Ylönen T SSH Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6, (4-4)
  131. Cheswick B and Bellovin S A DNS filter and switch for packet-filtering gateways Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6, (2-2)
  132. ACM
    Weiss R, Vélez B and Sheldon M HyPursuit Proceedings of the the seventh ACM conference on Hypertext, (180-193)
  133. Baker M, Zhao X, Cheshire S and Stone J Supporting mobility in MosquitoNet Proceedings of the 1996 annual conference on USENIX Annual Technical Conference, (11-11)
  134. Eickler A, Gerlhof C and Kossmann D A Performance Evaluation of OID Mapping Techniques Proceedings of the 21th International Conference on Very Large Data Bases, (18-29)
  135. Perkins C and Luo K (1995). Using DHCP with computers that move0, Wireless Networks, 1:3, (341-353), Online publication date: 1-Aug-1995.
  136. Schönwälder J and Langendörfer H Tcl extensions for network management applications Proceedings of the 3rd Annual USENIX Workshop on Tcl/Tk - Volume 3, (30-30)
  137. Bellovin S Using the domain name system for system break-ins Proceedings of the 5th conference on USENIX UNIX Security Symposium - Volume 5, (18-18)
  138. Kim G, Orman H and O'Malley S Implementing a secure rlogin environment Proceedings of the 5th conference on USENIX UNIX Security Symposium - Volume 5, (7-7)
  139. ACM
    Francis P and Govindan R (1994). Flexible routing and addressing for a next generation IP, ACM SIGCOMM Computer Communication Review, 24:4, (116-125), Online publication date: 1-Oct-1994.
  140. ACM
    Francis P and Govindan R Flexible routing and addressing for a next generation IP Proceedings of the conference on Communications architectures, protocols and applications, (116-125)
  141. ACM
    Bowman C, Danzig P, Manber U and Schwartz M (1994). Scalable Internet resource discovery, Communications of the ACM, 37:8, (98-ff.), Online publication date: 1-Aug-1994.
  142. ACM
    Schwartz M and Wood D (1993). Discovering shared interests using graph analysis, Communications of the ACM, 36:8, (78-89), Online publication date: 1-Aug-1993.
  143. ACM
    Bellovin S (1993). Packets found on an internet, ACM SIGCOMM Computer Communication Review, 23:3, (26-31), Online publication date: 1-Jul-1993.
  144. ACM
    Ordille J and Miller B (1993). Database challenges in global information systems, ACM SIGMOD Record, 22:2, (403-407), Online publication date: 1-Jun-1993.
  145. ACM
    Ordille J and Miller B Database challenges in global information systems Proceedings of the 1993 ACM SIGMOD international conference on Management of data, (403-407)
  146. ACM
    Teraoka F and Tokoro M (1993). Host migration transparency in IP networks, ACM SIGCOMM Computer Communication Review, 23:1, (45-65), Online publication date: 3-Jan-1993.
  147. ACM
    Danzig P, Obraczka K and Kumar A (1992). An analysis of wide-area name server traffic, ACM SIGCOMM Computer Communication Review, 22:4, (281-292), Online publication date: 1-Oct-1992.
  148. ACM
    Danzig P, Obraczka K and Kumar A An analysis of wide-area name server traffic Conference proceedings on Communications architectures & protocols, (281-292)
  149. ACM
    Shaheen-Gouda A and Loucks L Name borders Proceedings of the 5th workshop on ACM SIGOPS European workshop: Models and paradigms for distributed systems structuring, (1-6)
  150. Znati T and Molka J A simulation based analysis of naming schemes for distributed systems Proceedings of the 25th annual symposium on Simulation, (42-51)
  151. ACM
    Teraoka F, Yokore Y and Tokoro M (1991). A network architecture providing host migration transparency, ACM SIGCOMM Computer Communication Review, 21:4, (209-220), Online publication date: 1-Aug-1991.
  152. ACM
    Ordille J and Miller B (1991). Nomenclator descriptive query optimization for large X.500 environments, ACM SIGCOMM Computer Communication Review, 21:4, (185-196), Online publication date: 1-Aug-1991.
  153. ACM
    Teraoka F, Yokore Y and Tokoro M A network architecture providing host migration transparency Proceedings of the conference on Communications architecture & protocols, (209-220)
  154. ACM
    Ordille J and Miller B Nomenclator descriptive query optimization for large X.500 environments Proceedings of the conference on Communications architecture & protocols, (185-196)
  155. ACM
    Comer D and Droms R (1990). Uniform access to Internet directory services, ACM SIGCOMM Computer Communication Review, 20:4, (50-59), Online publication date: 1-Aug-1990.
  156. ACM
    Comer D and Droms R Uniform access to Internet directory services Proceedings of the ACM symposium on Communications architectures & protocols, (50-59)
  157. ACM
    Mills D (1989). On the Accuracy and Stablility of Clocks Synchronized by the Network Time Protocol in the Internet System, ACM SIGCOMM Computer Communication Review, 20:1, (65-75), Online publication date: 1-Dec-1989.
  158. ACM
    Gray C and Cheriton D (1989). Leases: an efficient fault-tolerant mechanism for distributed file cache consistency, ACM SIGOPS Operating Systems Review, 23:5, (202-210), Online publication date: 1-Nov-1989.
  159. ACM
    Gray C and Cheriton D Leases: an efficient fault-tolerant mechanism for distributed file cache consistency Proceedings of the twelfth ACM symposium on Operating systems principles, (202-210)
  160. ACM
    Libes D (1989). Viewpoint, Communications of the ACM, 32:11, (1289-1291), Online publication date: 1-Nov-1989.
  161. ACM
    Mockapetris P and Dunlap K (1988). Development of the domain name system, ACM SIGCOMM Computer Communication Review, 18:4, (123-133), Online publication date: 1-Aug-1988.
  162. ACM
    Mockapetris P and Dunlap K Development of the domain name system Symposium proceedings on Communications architectures and protocols, (123-133)
Contributors
  • Information Sciences Institute

Recommendations