{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T02:57:44Z","timestamp":1725505064792},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540787303"},{"type":"electronic","value":"9783540787310"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-78731-0_1","type":"book-chapter","created":{"date-parts":[[2008,3,14]],"date-time":"2008-03-14T10:18:18Z","timestamp":1205489898000},"page":"1-18","source":"Crossref","is-referenced-by-count":20,"title":["Multipolarity for the Object Naming Service"],"prefix":"10.1007","author":[{"given":"Sergei","family":"Evdokimov","sequence":"first","affiliation":[]},{"given":"Benjamin","family":"Fabian","sequence":"additional","affiliation":[]},{"given":"Oliver","family":"G\u00fcnther","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","unstructured":"EPCglobal: The EPCglobal Architecture Framework \u2013 Version 1.2. In: Traub, K. (ed.) (September 2007)"},{"key":"1_CR2","unstructured":"Mealling, M.: EPCglobal Object Naming Service (ONS) 1.0 (2005)"},{"key":"1_CR3","unstructured":"EPCglobal: Implementation of the EPCglobal Network Root ONS. EPCglobal Position Paper (November 2005)"},{"key":"1_CR4","doi-asserted-by":"crossref","unstructured":"Fabian, B., G\u00fcnther, O.: Distributed ONS and its Impact on Privacy. In: Proc. IEEE International Conference on Communications (IEEE ICC 2007), Glasgow, pp. 1223\u20131228 (2007)","DOI":"10.1109\/ICC.2007.207"},{"key":"1_CR5","volume-title":"DNS and BIND","author":"C. Liu","year":"2006","unstructured":"Liu, C., Albitz, P.: DNS and BIND, 5th edn. O\u2019Reilly & Associates, Sebastopol (2006)","edition":"5"},{"key":"1_CR6","unstructured":"EPCglobal: EPC Information Services (EPCIS) Version 1.0 Specification (April 2007)"},{"key":"1_CR7","unstructured":"EPCglobal: EPC Tag Data Standards Version 1.3 (2006)"},{"key":"1_CR8","unstructured":"Fabian, B., G\u00fcnther, O., Spiekermann, S.: Security Analysis of the Object Name Service. In: Proceedings of the 1st International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU 2005), with IEEE ICPS 2005, Santorini, pp. 71\u201376 (2005)"},{"key":"1_CR9","unstructured":"Salamon, A.: DNS related RFCs, http:\/\/www.dns.net\/dnsrd\/rfc\/"},{"issue":"1","key":"1_CR10","first-page":"12","volume":"10","author":"S. Gibbard","year":"2007","unstructured":"Gibbard, S.: Geographic Implications of DNS Infrastructure Distribution. The Internet Protocol Journal\u00a010(1), 12\u201324 (2007)","journal-title":"The Internet Protocol Journal"},{"key":"1_CR11","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1145\/1015467.1015504","volume-title":"SIGCOMM 2004: Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications","author":"V. Ramasubramanian","year":"2004","unstructured":"Ramasubramanian, V., Sirer, E.G.: The Design and Implementation of a Next Generation Name Service for the Internet. In: SIGCOMM 2004: Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications, pp. 331\u2013342. ACM Press, New York (2004)"},{"issue":"1","key":"1_CR12","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1109\/TNET.2002.808407","volume":"11","author":"I. Stoica","year":"2003","unstructured":"Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: A Scalable Peer-to-peer Lookup Protocol for Internet Applications. Networking, IEEE\/ACM Transactions on\u00a011(1), 17\u201332 (2003)","journal-title":"Networking, IEEE\/ACM Transactions on"},{"key":"1_CR13","unstructured":"PITAC: Cyber security - a crisis of prioritization (February 2005), http:\/\/www.nitrd.gov\/pitac\/reports\/2005030_cybersecurity\/cybersecurity.pdf"},{"key":"1_CR14","doi-asserted-by":"crossref","unstructured":"Atkins, D., Austein, R.: Threat Analysis of the Domain Name System (DNS). In: Request for Comments - RFC 3833 (2004)","DOI":"10.17487\/rfc3833"},{"key":"1_CR15","doi-asserted-by":"crossref","unstructured":"Arends, R., Austein, R., Larson, M., Massey, D., Rose, S.: DNS Security Introduction and Requirements. In: Request for Comments - RFC 4033 (March 2005)","DOI":"10.17487\/rfc4033"},{"issue":"6","key":"1_CR16","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1145\/1247001.1247004","volume":"50","author":"A. Friedlander","year":"2007","unstructured":"Friedlander, A., Mankin, A., Maughan, W.D., Crocker, S.D.: DNSSEC: A Protocol toward Securing the Internet Infrastructure. Commun. ACM\u00a050(6), 44\u201350 (2007)","journal-title":"Commun. ACM"},{"key":"1_CR17","unstructured":"Ozment, A., Schechter, S.E.: Bootstrapping the Adoption of Internet Security Protocols. In: Proc. of the Fifth Workshop on the Economics of Information Security (WEIS 2006) (2006)"},{"key":"1_CR18","unstructured":"Leyden, J.: Homeland Security Grabs for Net\u2019s Master Keys (2007), http:\/\/www.theregister.co.uk\/2007\/04\/03\/dns_master_key_controversy\/"},{"key":"1_CR19","unstructured":"Kuerbis, B., Mueller, M.: Securing the Root: A Proposal for Distributing Signing Authority. Internet Governance Project Paper IGP 2007-2002 (2007)"},{"key":"1_CR20","volume-title":"Handbook of Applied Cryptography","author":"A.J. Menezes","year":"1997","unstructured":"Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)"},{"issue":"11","key":"1_CR21","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1979","unstructured":"Shamir, A.: How to Share a Secret. Commun. ACM\u00a022(11), 612\u2013613 (1979)","journal-title":"Commun. ACM"},{"key":"1_CR22","first-page":"313","volume":"48","author":"G.R. Blakley","year":"1979","unstructured":"Blakley, G.R.: Safeguarding Cryptographic Keys. Proc. of the National Computer Conference\u00a048, 313\u2013317 (1979)","journal-title":"Proc. of the National Computer Conference"},{"key":"1_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1007\/3-540-45539-6_15","volume-title":"Advances in Cryptology - EUROCRYPT 2000","author":"V. Shoup","year":"2000","unstructured":"Shoup, V.: Practical Threshold Signatures. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol.\u00a01807, pp. 207\u2013220. Springer, Heidelberg (2000)"},{"issue":"19","key":"1_CR24","doi-asserted-by":"publisher","first-page":"4148","DOI":"10.1016\/j.ins.2007.04.008","volume":"177","author":"K. Kaya","year":"2007","unstructured":"Kaya, K., Sel\u00e7uk, A.A.: Threshold Cryptography based on Asmuth-Bloom Secret Sharing. Inf. Sci.\u00a0177(19), 4148\u20134160 (2007)","journal-title":"Inf. Sci."}],"container-title":["Lecture Notes in Computer Science","The Internet of Things"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-78731-0_1.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T11:20:25Z","timestamp":1619522425000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-78731-0_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540787303","9783540787310"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-78731-0_1","relation":{},"subject":[]}}