{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:17:57Z","timestamp":1750220277484,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,12,7]],"date-time":"2021-12-07T00:00:00Z","timestamp":1638835200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,12,7]]},"DOI":"10.1145\/3488658.3493790","type":"proceedings-article","created":{"date-parts":[[2021,12,4]],"date-time":"2021-12-04T23:29:17Z","timestamp":1638660557000},"page":"11-12","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Securing name resolution in the IoT"],"prefix":"10.1145","author":[{"given":"Martine S.","family":"Lenders","sequence":"first","affiliation":[{"name":"Freie Universit\u00e4t Berlin"}]},{"given":"Christian","family":"Ams\u00fcss","sequence":"additional","affiliation":[]},{"given":"Cenk","family":"G\u00fcndogan","sequence":"additional","affiliation":[{"name":"HAW Hamburg"}]},{"given":"Thomas C.","family":"Schmidt","sequence":"additional","affiliation":[{"name":"HAW Hamburg"}]},{"given":"Matthias","family":"W\u00e4hlisch","sequence":"additional","affiliation":[{"name":"Freie Universit\u00e4t Berlin"}]}],"member":"320","published-online":{"date-parts":[[2021,12,7]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"C. Amsuess Z. Shelby M. Koster C. Bormann and P. van der Stok. 2021. CoRE Resource Directory. Internet-Draft - work in progress 28. IETF.  C. Amsuess Z. Shelby M. Koster C. Bormann and P. van der Stok. 2021. CoRE Resource Directory. Internet-Draft - work in progress 28. IETF."},{"key":"e_1_3_2_1_2_1","unstructured":"Bluetooth Special Interest Group. 2019. Bluetooth Core Specification. Bluetooth Specification 5.1. Bluetooth SIG.  Bluetooth Special Interest Group. 2019. Bluetooth Core Specification. Bluetooth Specification 5.1. Bluetooth SIG."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"C. Bormann M. Ersue and A. Keranen. 2014. Terminology for Constrained-Node Networks. RFC 7228. IETF.  C. Bormann M. Ersue and A. Keranen. 2014. Terminology for Constrained-Node Networks. RFC 7228. IETF.","DOI":"10.17487\/rfc7228"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3355369.3355575"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"J. Gregorio R. Fielding M. Hadley M. Nottingham and D. Orchard. 2012. URI Template. RFC 6570. IETF.  J. Gregorio R. Fielding M. Hadley M. Nottingham and D. Orchard. 2012. URI Template. RFC 6570. IETF.","DOI":"10.17487\/rfc6570"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"P. Hoffman and P. McManus. 2018. DNS Queries over HTTPS (DoH). RFC 8484. IETF.  P. Hoffman and P. McManus. 2018. DNS Queries over HTTPS (DoH). RFC 8484. IETF.","DOI":"10.17487\/RFC8484"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380139"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Z. Hu L. Zhu J. Heidemann A. Mankin D. Wessels and P. Hoffman. 2016. Specification for DNS over Transport Layer Security (TLS). RFC 7858. IETF.  Z. Hu L. Zhu J. Heidemann A. Mankin D. Wessels and P. Hoffman. 2016. Specification for DNS over Transport Layer Security (TLS). RFC 7858. IETF.","DOI":"10.17487\/RFC7858"},{"volume-title":"IEEE Standard for Low-Rate Wireless Networks","year":"2015","author":"IEEE 802.15 Working Group","key":"e_1_3_2_1_9_1"},{"key":"e_1_3_2_1_10_1","unstructured":"M.S. Lenders C. Ams\u00fcss . G\u00fcndogan T.C. Schmidt and M. W\u00e4hlisch. 2021. DNS Queries over CoAP (DoC). IETF Internet Draft - work in progress 02. IETF.  M.S. Lenders C. Ams\u00fcss . G\u00fcndogan T.C. Schmidt and M. W\u00e4hlisch. 2021. DNS Queries over CoAP (DoC). IETF Internet Draft - work in progress 02. IETF."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"T. Reddy D. Wing and P. Patil. 2017. DNS over Datagram Transport Layer Security (DTLS). RFC 8094. IETF.  T. Reddy D. Wing and P. Patil. 2017. DNS over Datagram Transport Layer Security (DTLS). RFC 8094. IETF.","DOI":"10.17487\/RFC8094"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"E. Rescorla and N. Modadugu. 2012. Datagram Transport Layer Security Version 1.2. RFC 6347. IETF.  E. Rescorla and N. Modadugu. 2012. Datagram Transport Layer Security Version 1.2. RFC 6347. IETF.","DOI":"10.17487\/rfc6347"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"G. Selander J. Mattsson F. Palombini and L. Seitz. 2019. Object Security for Constrained RESTful Environments (OSCORE). RFC 8613. IETF.  G. Selander J. Mattsson F. Palombini and L. Seitz. 2019. Object Security for Constrained RESTful Environments (OSCORE). RFC 8613. IETF.","DOI":"10.17487\/RFC8613"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"P. van der Stok C. Bormann and A. Sehgal. 2017. PATCH and FETCH Methods for the Constrained Application Protocol (CoAP). RFC 8132. IETF.  P. van der Stok C. Bormann and A. Sehgal. 2017. PATCH and FETCH Methods for the Constrained Application Protocol (CoAP). RFC 8132. IETF.","DOI":"10.17487\/RFC8132"}],"event":{"name":"CoNEXT '21: The 17th International Conference on emerging Networking EXperiments and Technologies","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"],"location":"Virtual Event Germany","acronym":"CoNEXT '21"},"container-title":["Proceedings of the CoNEXT Student Workshop"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3488658.3493790","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3488658.3493790","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:31:12Z","timestamp":1750188672000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3488658.3493790"}},"subtitle":["DNS over CoAP"],"short-title":[],"issued":{"date-parts":[[2021,12,7]]},"references-count":14,"alternative-id":["10.1145\/3488658.3493790","10.1145\/3488658"],"URL":"https:\/\/doi.org\/10.1145\/3488658.3493790","relation":{},"subject":[],"published":{"date-parts":[[2021,12,7]]},"assertion":[{"value":"2021-12-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}