Public Data : a New Substrate for Key Verification in DNSSEC
暂无分享,去创建一个
Beichuan Zhang | Eric Osterweil | Lixia Zhang | E. Osterweil | Lixia Zhang | Beichuan Zhang | D. Massey | Dan Massey
[1] Jia Wang,et al. Towards an accurate AS-level traceroute tool , 2003, SIGCOMM '03.
[2] Scott Rose,et al. DNS Security Introduction and Requirements , 2005, RFC.
[3] Ronald L. Rivest,et al. SDSI - A Simple Distributed Security Infrastructure , 1996 .
[4] Daniel Massey,et al. Quantifying the operational status of the DNSSEC deployment , 2008, IMC '08.
[5] Scott Rose,et al. Resource Records for the DNS Security Extensions , 2005, RFC.
[6] Steven M. Bellovin,et al. Using the Domain Name System for System Break-ins , 1995, USENIX Security Symposium.
[7] Derek Atkins,et al. Threat Analysis of the Domain Name System (DNS) , 2004, RFC.
[8] Rob Thomas,et al. The underground economy: priceless , 2006 .
[9] Yin Zhang,et al. On AS-level path inference , 2005, SIGMETRICS '05.
[10] Daniel Massey,et al. Deploying and Monitoring DNS Security (DNSSEC) , 2009, 2009 Annual Computer Security Applications Conference.
[11] Lixia Zhang,et al. Interadministrative Challenges in Managing DNSKEYs , 2009, IEEE Security & Privacy.
[12] Kimberly C. Claffy,et al. Toward Topology Dualism: Improving the Accuracy of AS Annotations for Routers , 2010, PAM.
[13] Scott Rose,et al. Protocol Modifications for the DNS Security Extensions , 2005, RFC.
[14] Lixia Zhang,et al. Observations from the DNSSEC Deployment , 2007, 2007 3rd IEEE Workshop on Secure Network Protocols.
[15] Daniel Massey,et al. Managing Trusted Keys in Internet-Scale Systems , 2009, 2009 Ninth Annual International Symposium on Applications and the Internet.
[16] Ratul Mahajan,et al. Inferring link weights using end-to-end measurements , 2002, IMW '02.
[17] Adrian Perrig,et al. Perspectives: Improving SSH-style Host Authentication with Multi-Path Probing , 2008, USENIX Annual Technical Conference.
[18] Renata Teixeira,et al. General Terms Measurement , 2022 .