{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T12:45:39Z","timestamp":1730205939921,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,8]]},"DOI":"10.1109\/chinacom.2012.6417443","type":"proceedings-article","created":{"date-parts":[[2013,1,30]],"date-time":"2013-01-30T22:52:09Z","timestamp":1359586329000},"page":"30-34","source":"Crossref","is-referenced-by-count":0,"title":["A method for DNS names identical resolution"],"prefix":"10.1109","author":[{"family":"Jiankang Yao","sequence":"first","affiliation":[]},{"family":"Wei Mao","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","article-title":"DNS security (DNSSEC) hashed authenticated denial of existence","volume":"5155","author":"laurie","year":"2008","journal-title":"RFC"},{"key":"15","article-title":"Non-terminal DNS name redirection","volume":"2672","author":"crawford","year":"1999","journal-title":"RFC"},{"key":"16","article-title":"Extension mechanisms for DNS (EDNSO)","volume":"2671","author":"vixie","year":"1999","journal-title":"RFC"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/1242489.1242499"},{"key":"14","article-title":"Dynamic updates in the domain name system (DNS UPDATE)","volume":"2136","author":"vixie","year":"1997","journal-title":"RFC"},{"key":"11","article-title":"Resource records for DNS security extensions","volume":"4034","author":"arends","year":"2005","journal-title":"RFC"},{"key":"12","article-title":"Protocol modifications for the DNS security extensions","volume":"4035","author":"arends","year":"2005","journal-title":"RFC"},{"key":"3","article-title":"Internationalizing domain names in applicatio IDNA","volume":"3490","author":"faltstrom","year":"2003","journal-title":"RFC"},{"key":"2","article-title":"Domain names - Implementation and specification","volume":"1035","author":"mockapetris","year":"1987","journal-title":"STD 13 RFC"},{"key":"1","article-title":"Domain names - Concepts and facilities","volume":"1034","author":"mockapetris","year":"1987","journal-title":"STD 13 RFC"},{"key":"10","article-title":"DNS security introduction and requirements","volume":"4033","author":"arends","year":"2005","journal-title":"RFC"},{"key":"7","article-title":"CNAME+DNAME name redirection","volume":"4","author":"sury","year":"2010","journal-title":"Draft-Sury-Dnsextcname- Dname-00 txt (Work in Progress)"},{"key":"6","article-title":"ION TLD variants implementation guideline","volume":"11","author":"yao","year":"2009","journal-title":"Drafi-Yao-Dnsop-Idntld-implementation- 0l txt (Work in Progress)"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3743"},{"journal-title":"Unihan Database","year":"2002","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/1450295.1450296"},{"journal-title":"Use Of Dns To Carry Configuration Metadata Concerning Automatic Replication of Zones","year":"2010","author":"vixie","key":"8"}],"event":{"name":"2012 7th International ICST Conference on Communications and Networking in China (CHINACOM 2012)","start":{"date-parts":[[2012,8,8]]},"location":"Kun Ming","end":{"date-parts":[[2012,8,10]]}},"container-title":["7th International Conference on Communications and Networking in China"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6410218\/6417432\/06417443.pdf?arnumber=6417443","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T20:19:20Z","timestamp":1490127560000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6417443\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,8]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/chinacom.2012.6417443","relation":{},"subject":[],"published":{"date-parts":[[2012,8]]}}}