{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T00:25:04Z","timestamp":1729643104919,"version":"3.28.0"},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,5]]},"DOI":"10.1109\/ict.2014.6845127","type":"proceedings-article","created":{"date-parts":[[2014,7,29]],"date-time":"2014-07-29T10:34:35Z","timestamp":1406630075000},"page":"298-392","source":"Crossref","is-referenced-by-count":2,"title":["Verification of DNSsec Delegation Signatures"],"prefix":"10.1109","author":[{"given":"Florian","family":"Kammuller","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"3","article-title":"Threat analysis of the domain name system","author":"atkins","year":"2004","journal-title":"DNS) RFC 3833 Internet Engineering Task Force"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4033"},{"key":"10","article-title":"Domain names-concepts and facilities","author":"mockapetris","year":"1987","journal-title":"STD 13 RFC 1034"},{"year":"0","key":"1"},{"journal-title":"It's the end of the Cache as We Know It","year":"2008","author":"kaminsky","key":"7"},{"key":"6","article-title":"Security of patched dns","volume":"7459","author":"herzberg","year":"2012","journal-title":"ESORICS"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1981.32"},{"key":"4","article-title":"A security evaluation of dnssec with nsec3","author":"bau","year":"2010","journal-title":"NDSS the Internet Society"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.1997.596779"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/SMC.2013.812"},{"key":"11","volume":"2283","author":"nipkow","year":"2002","journal-title":"Isabelle\/HOL-A Proof Assistant for Higher-Order Logic"},{"key":"12","doi-asserted-by":"crossref","DOI":"10.3233\/JCS-1998-61-205","article-title":"The inductive approach to verifying cryptographic protocols","volume":"6","author":"paulson","year":"1998","journal-title":"Journal of Computer Security"}],"event":{"name":"2014 21st International Conference on Telecommunications (ICT)","start":{"date-parts":[[2014,5,4]]},"location":"Lisbon, Portugal","end":{"date-parts":[[2014,5,7]]}},"container-title":["2014 21st International Conference on Telecommunications (ICT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6832895\/6845063\/06845127.pdf?arnumber=6845127","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,13]],"date-time":"2019-08-13T04:56:22Z","timestamp":1565672182000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6845127\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/ict.2014.6845127","relation":{},"subject":[],"published":{"date-parts":[[2014,5]]}}}