@Preamble{"\input bibnames.sty " # "\input path.sty " # "\hyphenation{
}"}
@String{ack-nhfb = "Nelson H. F. Beebe,
University of Utah,
Department of Mathematics, 110 LCB,
155 S 1400 E RM 233,
Salt Lake City, UT 84112-0090, USA,
Tel: +1 801 581 5254,
e-mail: \path|beebe@math.utah.edu|,
\path|beebe@acm.org|,
\path|beebe@computer.org| (Internet),
URL: \path|https://www.math.utah.edu/~beebe/|"}
@String{j-J-RES-NATL-INST-STAND-TECHNOL = "Journal of Research of the
National Institute of Standards and
Technology"}
@String{pub-ARTECH = "Artech House Inc."}
@String{pub-ARTECH:adr = "Norwood, MA, USA"}
@String{pub-AW = "Ad{\-d}i{\-s}on-Wes{\-l}ey"}
@String{pub-AW:adr = "Reading, MA, USA"}
@String{pub-CAMBRIDGE = "Cambridge University Press"}
@String{pub-CAMBRIDGE:adr = "Cambridge, UK"}
@String{pub-CHAPMAN-HALL-CRC = "Chapman and Hall/CRC"}
@String{pub-CHAPMAN-HALL-CRC:adr = "Boca Raton, FL, USA"}
@String{pub-CRC = "CRC Press"}
@String{pub-CRC:adr = "2000 N.W. Corporate Blvd., Boca Raton, FL
33431-9868, USA"}
@String{pub-ELSEVIER = "Elsevier"}
@String{pub-ELSEVIER:adr = "Amsterdam, The Netherlands"}
@String{pub-MCGRAW-HILL = "Mc{\-}Graw-Hill"}
@String{pub-MCGRAW-HILL:adr = "New York, NY, USA"}
@String{pub-NO-STARCH = "No Starch Press"}
@String{pub-NO-STARCH:adr = "San Francisco, CA, USA"}
@String{pub-NORTON = "W. W. Norton \& Co."}
@String{pub-NORTON:adr = "New York, NY, USA"}
@String{pub-OXFORD = "Oxford University Press"}
@String{pub-OXFORD:adr = "Walton Street, Oxford OX2 6DP, UK"}
@String{pub-PACKT = "Packt Publishing"}
@String{pub-PACKT:adr = "Birmingham"}
@String{pub-PH = "Pren{\-}tice-Hall"}
@String{pub-PH:adr = "Upper Saddle River, NJ 07458, USA"}
@String{pub-SYNGRESS = "Syngress Publishing, Inc."}
@String{pub-SYNGRESS:adr = "Rockland, MA, USA"}
@String{pub-YALE = "Yale University Press"}
@String{pub-YALE:adr = "New Haven, CT, USA"}
@Misc{Anonymous:2020:HFI,
author = "Anonymous",
title = "History of the {Finnish Internet}",
howpublished = "Web site",
day = "30",
month = nov,
year = "2020",
bibdate = "Thu Aug 01 07:03:05 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/internet2020.bib",
URL = "https://siy.fi/history-of-the-finnish-internet/",
abstract = "This Timeline is based on ``A History of the
Internet'' by Harri K. Salminen. It has been
complemented with details from a paper by Juha
Hein{\"a}nen, ``Eunet in Finland -- History''. Facts about
the development of the Finnish Communication and
Internet Exchange (FICIX) have been supplied by Jorma
Mellin and facts about the development of the .FI
top-level domain by Juhani Juselius.",
acknowledgement = ack-nhfb,
}
@TechReport{Fidler:2020:CAU,
author = "Bradley Fidler and Russ Mundy",
title = "The Creation and Administration of Unique Identifiers,
1967--2017",
type = "{Internet Corporation for Assigned Names and Numbers
(ICANN)} Report",
institution = "????",
pages = "118",
month = nov,
year = "2020",
bibdate = "Sat Jun 05 15:56:28 2021",
bibsource = "https://www.math.utah.edu/pub/tex/bib/internet2020.bib",
URL = "https://www.icann.org/en/system/files/files/creation-administration-unique-identifiers-1967-2017-18nov20-en.pdf",
acknowledgement = ack-nhfb,
remark = "Foreword by Vinton G. Cerf and Stephen D. Crocker",
}
@Book{Menczer:2020:FCN,
author = "Filippo Menczer and Santo Fortunato and Clayton A.
Davis",
title = "A First Course in Network Science",
publisher = pub-CAMBRIDGE,
address = pub-CAMBRIDGE:adr,
pages = "xv + 258",
year = "2020",
ISBN = "1-108-47113-7 (hardcover), 1-108-65394-4 (e-book)",
ISBN-13 = "978-1-108-47113-8 (hardcover), 978-1-108-65394-7
(e-book)",
LCCN = "TK5105.5 .M46 2020, T57.85 .M46 2020",
bibdate = "Mon Aug 31 11:31:44 MDT 2020",
bibsource = "fsz3950.oclc.org:210/WorldCat;
https://www.math.utah.edu/pub/tex/bib/internet2020.bib",
abstract = "Networks are everywhere: networks of friends,
transportation networks and the Web. Neurons in our
brains and proteins within our bodies form networks
that determine our intelligence and survival. This
modern, accessible textbook introduces the basics of
network science for a wide range of job sectors from
management to marketing, from biology to engineering,
and from neuroscience to the social sciences. Students
will develop important, practical skills and learn to
write code for using networks in their areas of
interest -- even as they are just learning to program
with Python. Extensive sets of tutorials and homework
problems provide plenty of hands-on practice and longer
programming tutorials online further enhance students'
programming skills. This intuitive and direct approach
makes the book ideal for a first course, aimed at a
wide audience without a strong background in
mathematics or computing but with a desire to learn the
fundamentals and applications of network science.",
acknowledgement = ack-nhfb,
}
@Book{vanOorschot:2021:CSI,
author = "Paul C. van Oorschot",
title = "Computer security and the {Internet}: tools and jewels
from malware to {Bitcoin}",
publisher = "Springer",
address = "Cham, Switzerland",
edition = "Second",
pages = "xxix + 446",
year = "2021",
DOI = "https://doi.org/10.1007/978-3-030-83411-1.",
ISBN = "3-030-83410-7 (hardcover), 3-030-83411-5 (e-book)",
ISBN-13 = "978-3-030-83410-4 (hardcover), 978-3-030-83411-1
(e-book)",
LCCN = "QA76.9.A25 V66 2021",
bibdate = "Mon May 5 07:17:42 MDT 2025",
bibsource = "fsz3950.oclc.org:210/WorldCat;
https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
https://www.math.utah.edu/pub/tex/bib/internet2020.bib",
series = "Information security and cryptography",
abstract = "Building on the core strengths of the inaugural book,
this second edition of a uniquely accessible textbook
provides a concise, yet comprehensive overview of
computer and Internet security. It builds on the design
principles to address security-related error patterns
that have plagued software and system designs for more
than 50 years. Computer Security and the Internet is
elementary in that it assumes no background in
security, but unlike oft high-level texts it does not
avoid low-level details. The book reinforces
fundamental academic concepts with examples and also
relates these concepts to practical challenges and
real-world incidents. Its overriding focus is brevity,
without sacrificing breadth of core topics or technical
detail within them; it designates selected content as
optional to help readers prioritize topics. While
knowledge of elementary operating-system and networking
concepts is helpful, review sections summarize the
essential background. Topics and features: Delivers
comprehensive, technically sound explanations without
burdening readers with mathematical proofs or lengthy
source-code examples (NEW) adds chapter on wireless LAN
security (Wi-Fi and 802.11) (NEW) adds chapter on
Bitcoin and Ethereum, blockchains and cryptocurrencies
Integrates inline exercises and supplemental
per-chapter references and endnotes, bridging to
further topics and serving as a springboard to research
literature. Dives selectively into fine points for
exemplary topics to concretely illustrate concepts and
principles. Provides pointers to key surveys and
relevant standards, including from the Internet
Engineering Task Force and the U.S. National Institute
of Standards and Technology. Ideal for a one- or
two-term introductory course for junior\slash senior
undergraduate or first-year graduate students, this
textbook\slash reference is also suitable for
self-study by anyone seeking a solid footing in
security, including software developers and computing
professionals, technical managers, and government
staff. Paul C. van Oorschot is a Professor of Computer
Science at Carleton University (Ottawa), Canada
Research Chair in Authentication and Computer Security,
ACM Fellow, and IEEE Fellow. His earlier industrial
career was in telecommunications and software
security.",
acknowledgement = ack-nhfb,
subject = "Computer security; Internet; Security measures",
tableofcontents = "1. Security Concepts and Principles \\
2. Cryptographic Building Blocks \\
3. User Authentication passwords, Biometrics and
Alternatives \\
4. Authentication Protocols and Key Establishment.-5.
Operating System Security and Access Control \\
6. Software Security exploits and Privilege Escalation
\\
7. Malicious Software \\
8. Public-Key Certificate Management and Use Cases \\
9. Web and Browser Security \\
10. Firewalls and Tunnels \\
11. Intrusion Detection and Network-Based Attacks \\
12. Wireless LAN Security: 802.11 and Wi-Fi \\
13. Bitcoin, Blockchains and Ethereum \\
Epilogue \\
Index",
}
@TechReport{FCC:2024:SSO,
author = "{Federal Communications Commission}",
title = "Safeguarding and Securing the {Open Internet} and
Restoring {Internet} Freedom",
type = "Ruling",
number = "FCC 24-52",
institution = "Federal Communications Commission",
address = "Washington, DC 20554, USA",
pages = "513 (final 82+ missing: should be 595+)",
day = "7",
month = may,
year = "2024",
bibdate = "Thu May 09 07:53:46 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/internet2020.bib",
URL = "https://docs.fcc.gov/public/attachments/FCC-24-52A1.pdf",
acknowledgement = ack-nhfb,
}
@Book{Shackelford:2024:FDR,
author = "Scott J. Shackelford and Scott O. Bradner",
title = "Forks in the Digital Road: Key Decisions in the
History of the {Internet}",
publisher = pub-OXFORD,
address = pub-OXFORD:adr,
pages = "xxiv + 207",
month = apr,
year = "2024",
DOI = "https://doi.org/10.1093/oso/9780197617762.001.0001",
ISBN = "0-19-761776-X (hardcover), 0-19-761777-8 (paperback),
0-19-761778-6 (e-book), 0-19-761779-4 (e-book),
0-19-761780-8 (e-book)",
ISBN-13 = "978-0-19-761776-2 (hardcover), 978-0-19-761777-9
(paperback), 978-0-19-761778-6 (e-book),
978-0-19-761779-3 (e-book), 978-0-19-761780-9
(e-book)",
LCCN = "TK5105.875.I57 .S533 2024",
bibdate = "Thu Aug 1 06:17:20 2024",
bibsource = "https://www.math.utah.edu/pub/tex/bib/internet2020.bib",
note = "Foreword by Vinton G. Cerf.",
abstract = "Science fiction has long featured various visions of
cyberspace. From the original ''shared hallucination``
in William Gibson's \booktitle{Neuromancer}, which
first coined the term 'cyberspace,' to the dystopian
metaverse of the Matrix, authors and fans alike have
been fascinated by how interconnected technologies that
are being developed today will shape our collective
future, for better and worse. Less common is an urge to
look back and understand how decisions made by a
relatively small number of entrepreneurs, graduate
students, researchers, and government officials have
given us the Internet we have. But if we don't know
where we've been, it's tough to understand where we
are, to say nothing of where we're headed. This book
revisits some of these key decision points in the
history of cybersecurity and Internet governance,
revealing the potential alternative options that
existed at the time, and engage with that perennial
question --- what if? What if encryption had been built
into the Internet's architecture from the beginning?
What if Section 230, which shields Internet platforms
from civil liability, had taken a different form? What
if Tim-Berners Lee had taken the advice of counsel and
patented the World Wide Web? And what if the U.S.
government had not helped to establish the Internet
Corporation for Assigned Names and Numbers (ICANN) in
1998, or elected not to launch a new era of cyber
conflict in 2006? This book answers these questions,
and many more.",
acknowledgement = ack-nhfb,
subject = "Internet; History; Government policy; United States;
Histoire; Politique gouvernementale; {\'E}tats-Unis",
tableofcontents = "It was not just the bomb: Setting the stage: core
technical decisions that created the Internet \\
``Layer 9'' : core policy decisions that gave us the
Internet we have \\
A flaw in the design \\
The web for free \\
Regulating online speech \\
Why we're still living in 1995: ISP wars and net
neutrality \\
What passed for Internet governance \\
Taking stock: the Internet we deserve",
}