{"id":"https://openalex.org/W3119956908","doi":"https://doi.org/10.1145/3444370.3444594","title":"Decentralization of DNS","display_name":"Decentralization of DNS","publication_year":2020,"publication_date":"2020-12-04","ids":{"openalex":"https://openalex.org/W3119956908","doi":"https://doi.org/10.1145/3444370.3444594","mag":"3119956908"},"language":"en","primary_location":{"id":"doi:10.1145/3444370.3444594","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3444370.3444594","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2020 International Conference on Cyberspace Innovation of Advanced Technologies","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5112111793","display_name":"Shi Yin","orcid":null},"institutions":[{"id":"https://openalex.org/I4210136793","display_name":"Peng Cheng Laboratory","ror":"https://ror.org/03qdqbt06","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210136793"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Shi Yin","raw_affiliation_strings":["Cyberspace Advanced Technology Research Institute, Guangzhou, China, Cyberspace Security Research Center, Peng Cheng Laboratory, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"Cyberspace Advanced Technology Research Institute, Guangzhou, China, Cyberspace Security Research Center, Peng Cheng Laboratory, Shenzhen, China","institution_ids":["https://openalex.org/I4210136793"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069488119","display_name":"Teng Yu","orcid":"https://orcid.org/0000-0002-9205-2398"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yu Teng","raw_affiliation_strings":["Zhong Zi Hua Ke Traffic Construction Technology Co. Ltd, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Zhong Zi Hua Ke Traffic Construction Technology Co. Ltd, Beijing, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5044196870","display_name":"Ning Hu","orcid":"https://orcid.org/0000-0002-8355-0969"},"institutions":[{"id":"https://openalex.org/I4210136793","display_name":"Peng Cheng Laboratory","ror":"https://ror.org/03qdqbt06","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210136793"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ning Hu","raw_affiliation_strings":["Cyberspace Advanced Technology Research Institute, Guangzhou, China, Cyberspace Security Research Center, Peng Cheng Laboratory, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"Cyberspace Advanced Technology Research Institute, Guangzhou, China, Cyberspace Security Research Center, Peng Cheng Laboratory, Shenzhen, China","institution_ids":["https://openalex.org/I4210136793"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101148979","display_name":"Xu Dong Jia","orcid":null},"institutions":[{"id":"https://openalex.org/I4210136793","display_name":"Peng Cheng Laboratory","ror":"https://ror.org/03qdqbt06","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210136793"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xu Dong Jia","raw_affiliation_strings":["Cyberspace Advanced Technology, GuangZhou University, Guangzhou, China, Cyberspace Security Research Center, Peng Cheng Laboratory, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"Cyberspace Advanced Technology, GuangZhou University, Guangzhou, China, Cyberspace Security Research Center, Peng Cheng Laboratory, Shenzhen, China","institution_ids":["https://openalex.org/I4210136793"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5112111793"],"corresponding_institution_ids":["https://openalex.org/I4210136793"],"apc_list":null,"apc_paid":null,"fwci":0.3084,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.63087046,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"335","last_page":"341"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10742","display_name":"Peer-to-Peer Network Technologies","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10742","display_name":"Peer-to-Peer Network Technologies","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/domain-name-system","display_name":"Domain Name System","score":0.9646155834197998},{"id":"https://openalex.org/keywords/decentralization","display_name":"Decentralization","score":0.7128683924674988},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6874960064888},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6500545144081116},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.6384648680686951},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.19563326239585876}],"concepts":[{"id":"https://openalex.org/C35026560","wikidata":"https://www.wikidata.org/wiki/Q8767","display_name":"Domain Name System","level":3,"score":0.9646155834197998},{"id":"https://openalex.org/C136810230","wikidata":"https://www.wikidata.org/wiki/Q188961","display_name":"Decentralization","level":2,"score":0.7128683924674988},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6874960064888},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6500545144081116},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.6384648680686951},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.19563326239585876},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3444370.3444594","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3444370.3444594","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2020 International Conference on Cyberspace Innovation of Advanced Technologies","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5799999833106995,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W198024327","https://openalex.org/W1601376565","https://openalex.org/W1907293129","https://openalex.org/W2032242937","https://openalex.org/W2103863878","https://openalex.org/W2118428193","https://openalex.org/W2137448287","https://openalex.org/W2150676586","https://openalex.org/W2163059190","https://openalex.org/W2188530018","https://openalex.org/W2259715055","https://openalex.org/W2298236901","https://openalex.org/W2396036502","https://openalex.org/W2785322805","https://openalex.org/W2795293004","https://openalex.org/W2883979693","https://openalex.org/W2898841373","https://openalex.org/W2954095056","https://openalex.org/W2961501274","https://openalex.org/W2975425688","https://openalex.org/W3037420541","https://openalex.org/W3162105941","https://openalex.org/W3163551614","https://openalex.org/W4232389656","https://openalex.org/W6607977002","https://openalex.org/W6697294619"],"related_works":["https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2186336397","https://openalex.org/W3140943723","https://openalex.org/W3125369811","https://openalex.org/W2481378325","https://openalex.org/W2330351317","https://openalex.org/W1512425042","https://openalex.org/W2010376978","https://openalex.org/W2347300234"],"abstract_inverted_index":{"The":[0,22],"Internet":[1,12],"Domain":[2],"Name":[3],"System":[4],"(DNS)":[5],"provides":[6],"domain":[7,113],"name":[8,114],"resolution":[9,115],"services":[10],"for":[11,130],"applications":[13],"and":[14,111,120,134],"is":[15,83,101],"a":[16,29,84],"vital":[17],"infrastructure":[18],"of":[19,24,45,81,92,107,139],"the":[20,41,46,66,72,77,89,105,108,112,126,136],"Internet.":[21],"security":[23,34,42,56,73,90],"DNS":[25,47,55,67,78,82,93,98,109,131],"has":[26],"always":[27],"been":[28],"hot":[30],"issue":[31],"in":[32,58,125],"network":[33],"research.":[35,141],"Traditional":[36],"research":[37,123],"work":[38,124],"mainly":[39],"improves":[40],"protection":[43],"capabilities":[44],"system":[48,110],"by":[49,76],"designing":[50],"security-enhanced":[51],"protocols.":[52],"However,":[53],"frequent":[54],"incidents":[57],"recent":[59],"years":[60,129],"have":[61],"shown":[62],"that":[63],"simply":[64],"improving":[65],"protocol":[68],"cannot":[69],"completely":[70],"eliminate":[71],"threats":[74],"faced":[75],"system.":[79,94],"Decentralization":[80],"novel":[85],"idea":[86],"to":[87,103],"improve":[88],"capability":[91],"Unlike":[95],"traditional":[96],"solutions,":[97],"decentralization":[99,132],"technology":[100],"dedicated":[102],"changing":[104],"architecture":[106],"process.":[116],"This":[117],"article":[118],"analyzes":[119],"summarizes":[121],"representative":[122],"past":[127],"20":[128],"technology,":[133],"discusses":[135],"development":[137],"trend":[138],"future":[140]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
