{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,27]],"date-time":"2025-07-27T07:55:17Z","timestamp":1753602917861,"version":"3.41.0"},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2012,8,1]],"date-time":"2012-08-01T00:00:00Z","timestamp":1343779200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2012,8,1]],"date-time":"2012-08-01T00:00:00Z","timestamp":1343779200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,8]]},"DOI":"10.1109\/chinacom.2012.6417444","type":"proceedings-article","created":{"date-parts":[[2013,1,30]],"date-time":"2013-01-30T22:52:09Z","timestamp":1359586329000},"page":"35-42","source":"Crossref","is-referenced-by-count":2,"title":["Availability analysis of DNSSEC resolution and validation service"],"prefix":"10.1109","author":[{"family":"Yong Wang","sequence":"first","affiliation":[{"name":"Institute of Computing Technology, Chinese Academy of Sciences, Graduate University of Chinese Academy of Sciences, Beijing, China"}]},{"family":"Xiaochun Yun","sequence":"additional","affiliation":[{"name":"Institute of Computing Technology, Chinese Academy of Sciences, Graduate University of Chinese Academy of Sciences, Beijing, China"}]},{"family":"Gang Xiong","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, Graduate University of Chinese Academy of Sciences, Beijing, China"}]},{"family":"Zhen Li","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, Graduate University of Chinese Academy of Sciences, Beijing, China"}]},{"family":"Yao Yao","sequence":"additional","affiliation":[{"name":"Institute of Information Engineering, Chinese Academy of Sciences, Graduate University of Chinese Academy of Sciences, Beijing, China"}]}],"member":"263","reference":[{"issue":"9","key":"ref1","article-title":"Survey on domain name system security","volume":"28","author":"Wang","year":"2007","journal-title":"Journal on Communications"},{"volume-title":"Domain Name System Security Extensions","year":"1999","key":"ref2"},{"volume-title":"DNS Security Introduction and Requirements","year":"2005","key":"ref3"},{"volume-title":"Resource Records for the DNS Security Extensions","year":"2005","key":"ref4"},{"volume-title":"Protocol Modifications for the DNS Security Extensions","year":"2005","key":"ref5"},{"journal-title":"Principle and practice of DNSSEC. CNNIC registrar exchange","article-title":"China Internet Network Information Center Technical Department","year":"2009","key":"ref6"},{"volume-title":"Economical and Political Implications of DNSSEC Deployment","year":"2010","author":"Axel","key":"ref7"},{"key":"ref8","first-page":"169","article-title":"Deploying DNS Security (DNSSEC)","volume-title":"Large-Scale Operational Environments Conference For Homeland Security, 2009. CATCH \u201909. Cybersecurity Applications & Technology","author":"Gersch"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2010.10"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICCGI.2006.27"},{"key":"ref11","article-title":"Measuring the resource requirements of DNSSEC","volume-title":"Technical Report RIPE-352","author":"Olaf","year":"2005"},{"volume-title":"DNSSEC Feasibility Issues and the Transport Validation Assessment","year":"2006","author":"Rikitake","key":"ref12"},{"volume-title":"Test Report: DNSSEC Impact on Broadband Routers and Firewalls","year":"2008","author":"Bellis","key":"ref13"},{"volume-title":"A Short Note about DNSSEC Impact on Root Server Answer Sizes","year":"2006","author":"Thierry","key":"ref14"},{"volume-title":"An Analysis of DNSSEC","author":"Ashok","key":"ref15"},{"volume-title":"Limiting replay vulnerabilities in dnssec","year":"2008","author":"Yan","key":"ref16"},{"issue":"6","key":"ref17","first-page":"44","article-title":"DNSSEC: a protocol toward securing the internet infrastructure","volume":"50","author":"Amy","year":"2007","journal-title":"Communications of the ACM - Smart business networks"},{"issue":"33","key":"ref18","first-page":"345","article-title":"An Analysis of DNSSEC Transport Overhead Increase","volume-title":"IPSJ SIG Technical Reports 2005-CSEC-28","volume":"2005","author":"Rikitake","year":"2005"},{"key":"ref19","article-title":"Consequences of compromised zone keys in DNSSEC","volume-title":"Research Report 5854, INRIA, Mars","author":"Guette","year":"2006"},{"volume-title":"DNS Configures in Win 7 and Win Server 2008 R2. 2010.7","key":"ref20"},{"volume-title":"Understanding DNSSEC in Windows","year":"2009","key":"ref21"},{"volume-title":"Report of Domain name service and safety status in China","year":"2011","key":"ref22"}],"event":{"name":"2012 7th International ICST Conference on Communications and Networking in China (CHINACOM)","start":{"date-parts":[[2012,8,8]]},"location":"Kunming, China","end":{"date-parts":[[2012,8,10]]}},"container-title":["7th International Conference on Communications and Networking in China"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6410218\/6417432\/06417444.pdf?arnumber=6417444","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T05:35:34Z","timestamp":1747805734000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6417444\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,8]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/chinacom.2012.6417444","relation":{},"subject":[],"published":{"date-parts":[[2012,8]]}}}