You are here: Home > Publications > RIPE Labs
RIPE Documents and Policy Proposals
Archived Content
Mailing List Archives

It appears that you are searching for a specific IP address, range or prefix, or an ASN. Search results appear below, but you can also search for this resource in the RIPE Database.

By pressing the "Search" button you explicitly express your agreement with the RIPE Database Terms and Conditions.

The RIPE Database allows Whois queries on Internet resources.

Can't find what you're looking for? Try quotation marks around search terms with multiple words, file names, or hyphenations. It can improve your search results.
Are you seeing too many obsolete RIPE Documents? Uncheck "Obsolete, Withdrawn, Accepted".

Search results from ripe.net

71 items matching your search terms
61
Page - On RIPE Labs
Rolling over the algorithm (usually to a stronger variant) used to sign a DNS zone isn't as easy as regular key roll-overs. This is because some DNSSEC ...
62
Abuse Contact Management in the RIPE Database (as defined in ripe-563) mandates the RIPE NCC to gather and publish abuse contact information for Internet ...
63
This article presents a software-based prototype able to estimate the most queried domain names in a stream of DNS traffic at 12Mpps (wire-rate 10GbE). The ...
64
In this article, I'm showing how we can mitigate DNS attacks by implementing a stateless firewall filter at the aggregation or edge router.
65
I am at the IETF 98 in Chicago and I am planning to do a bit of blogging during the week, sharing highlights from my own very personal perspective.
66
The Elliptic Curve Cryptography (ECC) is becoming increasingly popular in DNSSEC. While it is sometimes considered to be a remedy for the low DNSSEC adoption ...
67
An increasing number of countries are passing laws that facilitate the mass surveillance of their citizens. In response, governments and citizens are ...
68
Here are the first results of our DNS transfer size measurements. We are interested to determine any possible problems for users of K-root once it starts ...
69
Today begins the newest edition of four-yearly Dutch summer camping conferences for and by hackers: SHA2017. Since there is an overlap between topics and ...
70
In this article we take a look at DNS priming queries arriving during the deployment of a DNSSEC signed zone at the DNS root servers. We are specifically ...
71
IP anycast has been widely used to replicate services in multiple locations as a way to deliver better performance and resilience. It has been largely employed ...
71 items matching your search terms