{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:40:08Z","timestamp":1750192808491,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":42,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,7,27]],"date-time":"2020-07-27T00:00:00Z","timestamp":1595808000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,7,27]]},"DOI":"10.1145\/3404868.3406665","type":"proceedings-article","created":{"date-parts":[[2020,7,5]],"date-time":"2020-07-05T12:23:10Z","timestamp":1593951790000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Enabling Privacy-Aware Zone Exchanges Among Authoritative and Recursive DNS Servers"],"prefix":"10.1145","author":[{"given":"Nikos","family":"Kostopoulos","sequence":"first","affiliation":[{"name":"NETMODE Laboratory, National Technical University of Athens (NTUA), Greece"}]},{"given":"Dimitris","family":"Kalogeras","sequence":"additional","affiliation":[{"name":"NETMODE Laboratory, National Technical University of Athens (NTUA), Greece"}]},{"given":"Vasilis","family":"Maglaris","sequence":"additional","affiliation":[{"name":"NETMODE Laboratory, National Technical University of Athens (NTUA), Greece"}]}],"member":"320","published-online":{"date-parts":[[2020,7,27]]},"reference":[{"volume-title":"Dyn. Retrieved","year":"2016","author":"Hilton Scott","key":"e_1_3_2_1_1_1"},{"volume-title":"DevCentral. Retrieved","year":"2018","author":"Wagnon John","key":"e_1_3_2_1_2_1"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.2197\/ipsjjip.25.854"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.031413.00127"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2019.00044"},{"volume-title":"Medium. Retrieved","year":"2017","author":"Shevchenko Valeriy","key":"e_1_3_2_1_6_1"},{"volume-title":"Retrieved","year":"2018","key":"e_1_3_2_1_7_1"},{"key":"e_1_3_2_1_8_1","first-page":"75","volume-title":"Cuckoo Filter: Practically Better Than Bloom. In Proceedings of the 10th ACM International Conference on Emerging Networking Experiments and Technologies (CoNEXT)","author":"Fan Bin","year":"2014"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/362686.362692"},{"volume-title":"Enabling Privacy-Aware Zone Exchanges Among Authoritative and Recursive DNS Servers. Retrieved","year":"2020","author":"Kostopoulos Nikos","key":"e_1_3_2_1_10_1"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.031611.00024"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/285243.285287"},{"volume-title":"Internet Engineering Task Force (IETF)","year":"2001","author":"Bellovin Steven M.","key":"e_1_3_2_1_13_1"},{"volume-title":"Using Bloom Filters with DNSSEC. Retrieved","year":"2020","key":"e_1_3_2_1_14_1"},{"key":"e_1_3_2_1_15_1","first-page":"98","volume-title":"Proceedings of the 16th IFIP\/IEEE Symposium on Integrated Network and Service Management (IM)","author":"van Rijswijk-Deij Roland","year":"2019"},{"volume-title":"Retrieved","year":"2020","author":"Consulting Intersoft","key":"e_1_3_2_1_16_1"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/3241094.3241115"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMSNETS.2013.6465572"},{"volume-title":"Retrieved","year":"2020","author":"Documentation DNS","key":"e_1_3_2_1_19_1"},{"volume-title":"Random Subdomain Attack Mitigation Using Bloom Filter for Unbound. Retrieved","year":"2020","author":"Higashi Daisuke","key":"e_1_3_2_1_20_1"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.2197\/ipsjjip.24.793"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2018.07.177"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132465.3132474"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/CloudNet47604.2019.9064119"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"Edward P. Lewis and Alfred Hoenes. 2010. DNS Zone Transfer Protocol (AXFR) RFC 5936.  Edward P. Lewis and Alfred Hoenes. 2010. DNS Zone Transfer Protocol (AXFR) RFC 5936.","DOI":"10.17487\/rfc5936"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC1995"},{"key":"e_1_3_2_1_27_1","unstructured":"Paul A. Vixie Susan Thomson Yakov Rekhter and Jim Bound. 1997. Dynamic Updates in the Domain Name System (DNS UPDATE). RFC 2136.  Paul A. Vixie Susan Thomson Yakov Rekhter and Jim Bound. 1997. Dynamic Updates in the Domain Name System (DNS UPDATE). RFC 2136."},{"volume-title":"Scalable Cuckoo Filter. Retrieved","year":"2020","author":"Do Huy","key":"e_1_3_2_1_28_1"},{"key":"e_1_3_2_1_29_1","unstructured":"MurmurHash. Wikipedia. Retrieved June 19 2020 from https:\/\/en.wikipedia.org\/wiki\/MurmurHash.  MurmurHash. Wikipedia. Retrieved June 19 2020 from https:\/\/en.wikipedia.org\/wiki\/MurmurHash."},{"volume-title":"Retrieved","year":"2020","author":"Systems Dynu","key":"e_1_3_2_1_30_1"},{"volume-title":"Retrieved","year":"2020","author":"Internet Systems Consortium","key":"e_1_3_2_1_31_1"},{"volume-title":"Retrieved","year":"2020","author":"Internet Foundation The Swedish","key":"e_1_3_2_1_32_1"},{"volume-title":"Summary and Archives of Leaked Russian TLD DNS Data. Retrieved","year":"2020","author":"Bryant Matthew","key":"e_1_3_2_1_33_1"},{"volume-title":"Retrieved","year":"2020","key":"e_1_3_2_1_34_1"},{"key":"e_1_3_2_1_35_1","unstructured":"Internationalized Domain Names. ICANN. Retrieved June 19 2020 from https:\/\/www.icann.org\/resources\/pages\/idn-2012-02-25-en.  Internationalized Domain Names. ICANN. Retrieved June 19 2020 from https:\/\/www.icann.org\/resources\/pages\/idn-2012-02-25-en."},{"key":"e_1_3_2_1_36_1","first-page":"1041","volume-title":"Proceedings of the VLDB Endowment","volume":"11","author":"Alex","year":"2018"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3376122"},{"key":"e_1_3_2_1_38_1","first-page":"197","volume-title":"Proceedings of the VLDB Endowment","volume":"13","author":"Wang Minmei","year":"2019"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"crossref","unstructured":"Nikos Kostopoulos Dimitris Kalogeras and Vasilis Maglaris. 2020. Leveraging on the XDP Framework for the Efficient Mitigation of Water Torture Attacks within Authoritative DNS Servers. To appear in the Proceedings of the 6th IEEE International Conference on Network Softwarization (NetSoft) Virtual Conference June 2020.  Nikos Kostopoulos Dimitris Kalogeras and Vasilis Maglaris. 2020. Leveraging on the XDP Framework for the Efficient Mitigation of Water Torture Attacks within Authoritative DNS Servers. To appear in the Proceedings of the 6th IEEE International Conference on Network Softwarization (NetSoft) Virtual Conference June 2020.","DOI":"10.1109\/NetSoft48620.2020.9165454"},{"key":"e_1_3_2_1_40_1","unstructured":"Lior Shafir Yehuda Afek and Anat Bremler-Barr. 2020. NXNSAttack: Recursive DNS Inefficiencies and Vulnerabilities. In arXiv preprint arXiv:2005.09107.  Lior Shafir Yehuda Afek and Anat Bremler-Barr. 2020. NXNSAttack: Recursive DNS Inefficiencies and Vulnerabilities. In arXiv preprint arXiv:2005.09107."},{"volume-title":"RIPE NCC. Retrieved","year":"2020","author":"\u0160pa\u010dek Petr","key":"e_1_3_2_1_41_1"},{"volume-title":"Federated Learning: Strategies for Improving Communication Efficiency. arXiv:1610.05492.","year":"2016","author":"Kone\u010dn\u00fd Jakub","key":"e_1_3_2_1_42_1"}],"event":{"name":"ANRW '20: Applied Networking Research Workshop","sponsor":["IRTF Internet Research Task Force","Internet Society Internet Society","SIGCOMM ACM Special Interest Group on Data Communication"],"location":"Virtual Event Spain","acronym":"ANRW '20"},"container-title":["Proceedings of the Applied Networking Research Workshop"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3404868.3406665","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3404868.3406665","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:17:44Z","timestamp":1750191464000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3404868.3406665"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7,27]]},"references-count":42,"alternative-id":["10.1145\/3404868.3406665","10.1145\/3404868"],"URL":"https:\/\/doi.org\/10.1145\/3404868.3406665","relation":{},"subject":[],"published":{"date-parts":[[2020,7,27]]},"assertion":[{"value":"2020-07-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}