Quantifying the operational status of the DNSSEC deployment
Proceedings of the 8th ACM SIGCOMM conference on Internet measurement
A centralized monitoring infrastructure for improving DNS security
RAID'10 Proceedings of the 13th international conference on Recent advances in intrusion detection
Touring DNS open houses for trends and configurations
IEEE/ACM Transactions on Networking (TON)
Hi-index | 0.00 |
A hash chain is constructed by repeated hashing from an initial value. While it finds applications for network protocol design it also poses threats to hash function one-way and collision-free properties. We investigate the complexity of breaking hash ...