{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T14:37:17Z","timestamp":1725892637075},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642365157"},{"type":"electronic","value":"9783642365164"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-36516-4_13","type":"book-chapter","created":{"date-parts":[[2013,3,13]],"date-time":"2013-03-13T13:11:01Z","timestamp":1363180261000},"page":"125-134","source":"Crossref","is-referenced-by-count":7,"title":["Measuring Occurrence of DNSSEC Validation"],"prefix":"10.1007","author":[{"given":"Matth\u00e4us","family":"Wander","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Torben","family":"Weis","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"13_CR1","unstructured":"Kaminsky, D.: Black ops 2008: It\u2019s the end of the cache as we know it. Black Hat USA (August 2008)"},{"key":"13_CR2","doi-asserted-by":"crossref","unstructured":"Arends, R., Austein, R., Larson, M., Massey, D., Rose, S.: DNS Security Introduction and Requirements. RFC 4033 (March 2005)","DOI":"10.17487\/rfc4033"},{"key":"13_CR3","unstructured":"Anonymous: The collateral damage of internet censorship by dns injection. SIGCOMM Comput. Commun. Rev. 42(3), 21\u201327 (2012)"},{"key":"13_CR4","unstructured":"Weaver, N., Kreibich, C., Paxson, V.: Redirecting DNS for Ads and Profit. In: USENIX Workshop on Free and Open Communications on the Internet (FOCI), San Francisco, CA, USA (August 2011)"},{"key":"13_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-32287-7_1","volume-title":"Trust, Privacy and Security in Digital Business","author":"T. Hirsch","year":"2012","unstructured":"Hirsch, T., Lo Iacono, L., Wechsung, I.: How Much Network Security Must Be Visible in Web Browsers? In: Fischer-H\u00fcbner, S., Katsikas, S., Quirchmayr, G. (eds.) TrustBus 2012. LNCS, vol.\u00a07449, pp. 1\u201316. Springer, Heidelberg (2012)"},{"key":"13_CR6","unstructured":"Wander, M., Weis, T.: Dnssec resolver test, \n                    \n                      http:\/\/dnssec.vs.uni-due.de"},{"key":"13_CR7","unstructured":"Mao, Z.M., Cranor, C.D., Bouglis, F., Rabinovich, M., Spatscheck, O., Wang, J.: A precise and efficient evaluation of the proximity between web clients and their local dns servers. In: Proceedings of USENIX Annual Technical Conference, pp. 229\u2013242. USENIX Association (2002)"},{"key":"13_CR8","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1145\/1282380.1282415","volume-title":"Proceedings of the 2007 Conference on Applications, Technologies, Architectures and Protocols for Computer Communications, SIGCOMM 2007","author":"Y. Xie","year":"2007","unstructured":"Xie, Y., Yu, F., Achan, K., Gillum, E., Goldszmidt, M., Wobber, T.: How dynamic are ip addresses? In: Proceedings of the 2007 Conference on Applications, Technologies, Architectures and Protocols for Computer Communications, SIGCOMM 2007, pp. 301\u2013312. ACM, New York (2007)"},{"key":"13_CR9","doi-asserted-by":"publisher","first-page":"429","DOI":"10.1109\/ACSAC.2009.47","volume-title":"Proceedings of the 2009 Annual Computer Security Applications Conference, ACSAC 2009","author":"E. Osterweil","year":"2009","unstructured":"Osterweil, E., Massey, D., Zhang, L.: Deploying and monitoring dns security (dnssec). In: Proceedings of the 2009 Annual Computer Security Applications Conference, ACSAC 2009, pp. 429\u2013438. IEEE Computer Society, Washington, DC (2009)"},{"key":"13_CR10","doi-asserted-by":"crossref","unstructured":"Deccio, C., Sedayao, J., Kant, K., Mohapatra, P.: Quantifying and improving dnssec availability. In: 2011 Proceedings of 20th International Conference on Computer Communications and Networks (ICCCN), July 31- August 4, pp. 1\u20137 (2011)","DOI":"10.1109\/ICCCN.2011.6005908"},{"key":"13_CR11","unstructured":"RIPE NCC: Status for k.root-servers.net, \n                    \n                      http:\/\/k.root-servers.org\/statistics\/ROOT\/daily\/\n                    \n                    \n                   (accessed September 2012)"},{"key":"13_CR12","doi-asserted-by":"crossref","unstructured":"St.Johns, M.: Automated Updates of DNS Security (DNSSEC) Trust Anchors. RFC 5011 (September 2007)","DOI":"10.17487\/rfc5011"},{"issue":"5","key":"13_CR13","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1145\/1452335.1452341","volume":"38","author":"S. Castro","year":"2008","unstructured":"Castro, S., Wessels, D., Fomenkov, M., Claffy, K.: A day at the root of the internet. SIGCOMM Comput. Commun. Rev.\u00a038(5), 41\u201346 (2008)","journal-title":"SIGCOMM Comput. Commun. Rev."},{"key":"13_CR14","unstructured":"Gudmundsson, \u00d3., Crocker, S.D.: Observing dnssec validation in the wild. In: Securing and Trusting Internet Names, SATIN (2011)"},{"key":"13_CR15","unstructured":"Fujiwara, K.: Dnssec validation measurement. In: DNS-OARC Workshop, San Francisco, CA, USA (March 2011)"},{"key":"13_CR16","unstructured":"Fujiwara, K.: Number of possible dnssec validators seen at jp. In: IEPG Meeting @ IETF 83, Paris, France (March 2012)"},{"key":"13_CR17","unstructured":"Yu, Y., Wessels, D.: Quantifying dnssec validators. In: DNS-OARC Workshop, Toronto, Canada (October 2012)"},{"key":"13_CR18","unstructured":"SIDN: Dnssec test, \n                    \n                      http:\/\/dnssectest.sidn.nl\n                    \n                    \n                   (accessed August 2012)"}],"container-title":["Lecture Notes in Computer Science","Passive and Active Measurement"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-36516-4_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,11]],"date-time":"2019-05-11T19:25:08Z","timestamp":1557602708000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-36516-4_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642365157","9783642365164"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-36516-4_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}