Domain Name System Security Extensions

Results: 699



#Item
661Network architecture / Internet standards / Computer network security / File sharing networks / Domain name system / Denial-of-service attack / Character Generator Protocol / Domain Name System Security Extensions / Peer-to-peer / Internet protocols / Computing / Internet

Amplification Hell: Revisiting Network Protocols for DDoS Abuse Christian Rossow

Add to Reading List

Source URL: www.christian-rossow.de

Language: English - Date: 2014-02-26 10:59:10
662Internet standards / Computing / Public-key cryptography / Cryptographic protocols / Domain name system / Network Time Protocol / Domain Name System Security Extensions / Digest access authentication / NTLM / Cryptography / Internet / Internet protocols

Advanced Telecommunications/Information Distribution Research Program (ATIRP)

Add to Reading List

Source URL: www.eecis.udel.edu

Language: English - Date: 2003-01-09 19:58:21
663Network architecture / Computing / Internet standards / DNSSEC / Domain Name System Security Extensions / Public-key cryptography / Zone file / BIND / Internet / Domain name system / Internet protocols

Zone Key Tool A signing and key admin tool for DNSSEC

Add to Reading List

Source URL: www.hznet.de

Language: English - Date: 2009-02-28 07:26:48
664Internet protocols / Computing / DNSSEC / Domain Name System Security Extensions / Public-key cryptography / BIND / Name server / Zone file / DLV / Domain name system / Internet / Network architecture

DNSSEC Zone Management with ZKT

Add to Reading List

Source URL: www.hznet.de

Language: English - Date: 2010-01-27 09:04:16
665Domain name system / DNSSEC / Domain Name System Security Extensions / Public-key cryptography / File / Zone file / Configuration file / Ls / Path / Computing / Internet / Internet protocols

zkt-signer(8) zkt-signer(8)

Add to Reading List

Source URL: www.hznet.de

Language: English - Date: 2012-01-30 04:47:31
666Domain name system / Internet in the United States / Internet protocols / Internet Assigned Numbers Authority / Domain Name System Security Extensions / Request for Comments / ICANN / DNS root zone / Internet / Internet standards / Internet governance

IANA Department ! Plenary Report! IETF-89, London! Michelle  Co*on   Manager,  IANA  Services  

Add to Reading List

Source URL: iaoc.ietf.org

Language: English - Date: 2014-03-03 13:50:24
667Network architecture / Computing / Internet standards / DNSSEC / Domain Name System Security Extensions / Public-key cryptography / Name server / Domain name system / Internet / Internet protocols

/delivers/ CASE STUDY Using DNSSEC Experience To Prevent Cyber Attacks

Add to Reading List

Source URL: dyn.com

Language: English - Date: 2014-01-31 16:36:14
668Quartz crystal microbalance / Authorization certificate / Public key certificate / Simple public key infrastructure / NP / Domain Name System Security Extensions / Web of trust / Cryptography / Key management / Public-key cryptography

SOFTWARE—PRACTICE AND EXPERIENCE Softw. Pract. Exper., 0(0), 1–[removed]Prepared using speauth.cls [Version: [removed]v1.1a] Policy-directed certificate retrieval

Add to Reading List

Source URL: www.cis.upenn.edu

Language: English - Date: 2000-05-05 18:05:34
669Internet standards / Internet protocols / Public-key cryptography / Cryptographic protocols / Domain name system / Network Time Protocol / Domain Name System Security Extensions / Man-in-the-middle attack / Key management / Internet / Cryptography / Computing

AUTHENTICATION SCHEME FOR DISTRIBUTED, UBIQUITOUS, REAL-TIME PROTOCOLS 1,2 David L. Mills University of Delaware Newark, DE[removed]A reliable and ubiquitous network time service such as NTP requires some provision to prev

Add to Reading List

Source URL: www.eecis.udel.edu

Language: English - Date: 1998-07-28 17:01:12
670Network architecture / Internet standards / Computer network security / File sharing networks / Domain name system / Denial-of-service attack / Character Generator Protocol / Domain Name System Security Extensions / Simple Network Management Protocol / Internet protocols / Computing / Internet

Amplification Hell: Revisiting Network Protocols for DDoS Abuse Christian Rossow

Add to Reading List

Source URL: www.internetsociety.org

Language: English - Date: 2014-02-22 04:39:33
UPDATE