{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T03:50:52Z","timestamp":1725767452487},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,1]]},"DOI":"10.1109\/comsnets.2012.6151334","type":"proceedings-article","created":{"date-parts":[[2012,2,15]],"date-time":"2012-02-15T10:20:00Z","timestamp":1329301200000},"page":"1-10","source":"Crossref","is-referenced-by-count":1,"title":["TrickleDNS: Bootstrapping DNS security using social trust"],"prefix":"10.1109","author":[{"given":"Sriram","family":"Sankararaman","sequence":"first","affiliation":[]},{"given":"Jay","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Lakshminarayanan","family":"Subramanian","sequence":"additional","affiliation":[]},{"given":"Venugopalan","family":"Ramasubramanian","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Internet measurements: The rising tide and the DNS Snag","author":"huitema","year":"0","journal-title":"Proc of ITC Specialist Seminar on Internet Traffic Measurement and Modeling"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/505202.505223"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/258533.258660"},{"key":"ref13","article-title":"Domain Names: Concepts and Facilities","author":"mockapetris","year":"1987","journal-title":"Request for Comments 1034"},{"key":"ref14","article-title":"Domain Names: Implementation and Specification","author":"mockapetris","year":"1987","journal-title":"Request For Comments 1035"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1015467.1015503"},{"key":"ref16","article-title":"CoDNS: Improving DNS Performance and Reliability via Cooperative Lookups","author":"park","year":"0","journal-title":"Proc of Symposium on Operating Systems Design and Implementation"},{"key":"ref17","article-title":"ConfiDNS: Leveraging scale and history to improve DNS security","author":"poole","year":"0","journal-title":"Proceedings of WORLDS 2006"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1015467.1015504"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1330107.1330152"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2001.965864"},{"journal-title":"djbdns","year":"0","author":"bernstein","key":"ref3"},{"key":"ref6","article-title":"Serving DNS using a Peer-to-Peer Lookup Service","author":"cox","year":"0","journal-title":"Proc of IPTPS"},{"key":"ref5","article-title":"DNS Root\/gTLD Performance Measurements","author":"brownlee","year":"2001","journal-title":"Proc of Usenix Systems Administration Conference"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/WORDS.2005.33"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1096536.1096538"},{"journal-title":"Berkeley Millennium Cluster","year":"0","key":"ref2"},{"key":"ref9","article-title":"The Case for Pushing DNS","author":"handley","year":"0","journal-title":"Proc Of Hotnets"},{"key":"ref1","article-title":"Protocol Modifications for the Domain Name System Security Extensions","author":"arends","year":"0","journal-title":"RFC 4035"},{"key":"ref20","article-title":"Pastry: Scalable, Decentralized Object Location and Routing for Large-scale Peer-to-Peer Systems","author":"rowstorn","year":"2001","journal-title":"Proc of IFIP\/ACM International Conference on Distributed Systems Platforms"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/383059.383071"},{"key":"ref21","article-title":"Trickledns: Bootstrapping dns security using social trust","author":"sankararaman","year":"2011","journal-title":"Technical Report"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2002.1022242"},{"key":"ref23","article-title":"Decentralized security mechanisms for routing protocols","author":"subramanian","year":"0","journal-title":"Ph D thesis"},{"key":"ref26","first-page":"3","article-title":"Sybillimit: A near-optimal social network defense against sybil attacks","author":"yu","year":"0","journal-title":"IEEE Symposium on Security and Privacy 2008"},{"key":"ref25","article-title":"The Contribution of DNS Lookup Costs to Web Object Retrieval","author":"wills","year":"2000","journal-title":"Technical Report TR-00&#x2013;12"}],"event":{"name":"2012 Fourth International Conference on Communication Systems and Networks (COMSNETS)","start":{"date-parts":[[2012,1,3]]},"location":"Bangalore, India","end":{"date-parts":[[2012,1,7]]}},"container-title":["2012 Fourth International Conference on Communication Systems and Networks (COMSNETS 2012)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6145051\/6151271\/06151334.pdf?arnumber=6151334","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T15:16:13Z","timestamp":1490109373000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6151334\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,1]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/comsnets.2012.6151334","relation":{},"subject":[],"published":{"date-parts":[[2012,1]]}}}