Valid HTML 4.0! Valid CSS!
%%% -*-BibTeX-*-
%%% ====================================================================
%%%  BibTeX-file{
%%%     author          = "Nelson H. F. Beebe",
%%%     version         = "1.06",
%%%     date            = "05 May 2025",
%%%     time            = "07:23:49 MDT",
%%%     filename        = "internet2020.bib",
%%%     address         = "University of Utah
%%%                        Department of Mathematics, 110 LCB
%%%                        155 S 1400 E RM 233
%%%                        Salt Lake City, UT 84112-0090
%%%                        USA",
%%%     telephone       = "+1 801 581 5254",
%%%     URL             = "https://www.math.utah.edu/~beebe",
%%%     checksum        = "21575 395 2026 20060",
%%%     email           = "beebe at math.utah.edu, beebe at acm.org,
%%%                        beebe at computer.org (Internet)",
%%%     codetable       = "ISO/ASCII",
%%%     keywords        = "bibliography; BibTeX; Internet; network",
%%%     license         = "public domain",
%%%     supported       = "yes",
%%%     docstring       = "This bibliography records books and other
%%%                        publications about the Internet for the
%%%                        decade 2020--2029.  Earlier material is
%%%                        covered in the companion bibliographies,
%%%                        internet.bib, internet2000.bib, and
%%%                        internet2010.bib.
%%%
%%%                        At version 1.06, the year coverage looked
%%%                        like this:
%%%
%%%                             2020 (   3)    2022 (   0)    2024 (   2)
%%%                             2021 (   1)    2023 (   0)
%%%
%%%                             Book:             3
%%%                             Misc:             1
%%%                             TechReport:       2
%%%
%%%                             Total entries:    6
%%%
%%%                        Numerous errors in the sources noted above
%%%                        have been corrected.  Spelling has been
%%%                        verified with the UNIX spell and GNU ispell
%%%                        programs using the exception dictionary
%%%                        stored in the companion file with extension
%%%                        .sok.
%%%
%%%                        BibTeX citation tags are uniformly chosen as
%%%                        name:year:abbrev, where name is the family
%%%                        name of the first author or editor, year is a
%%%                        4-digit number, and abbrev is a 3-letter
%%%                        condensation of important title words.
%%%                        Citation tags were automatically generated by
%%%                        software developed for the BibNet Project.
%%%
%%%                        In this bibliography, entries are sorted
%%%                        first by ascending year, and within each
%%%                        year, alphabetically by author or editor,
%%%                        and then, if necessary, by the 3-letter
%%%                        abbreviation at the end of the BibTeX
%%%                        citation tag, using the bibsort -byyear
%%%                        utility.  Year order has been chosen to
%%%                        make it easier to identify the most recent
%%%                        work.
%%%
%%%                        The checksum field above contains a CRC-16
%%%                        checksum as the first value, followed by the
%%%                        equivalent of the standard UNIX wc (word
%%%                        count) utility output of lines, words, and
%%%                        characters.  This is produced by Robert
%%%                        Solovay's checksum utility.",
%%%  }
%%% ====================================================================
@Preamble{"\input bibnames.sty " # "\input path.sty " # "\hyphenation{
                 }"}

%%% ====================================================================
%%% Acknowledgement abbreviations:
@String{ack-nhfb = "Nelson H. F. Beebe,
                    University of Utah,
                    Department of Mathematics, 110 LCB,
                    155 S 1400 E RM 233,
                    Salt Lake City, UT 84112-0090, USA,
                    Tel: +1 801 581 5254,
                    e-mail: \path|beebe@math.utah.edu|,
                            \path|beebe@acm.org|,
                            \path|beebe@computer.org| (Internet),
                    URL: \path|https://www.math.utah.edu/~beebe/|"}

%%% ====================================================================
%%% Journal abbreviations:
@String{j-J-RES-NATL-INST-STAND-TECHNOL = "Journal of Research of the
                                  National Institute of Standards and
                                  Technology"}

%%% ====================================================================
%%% Publishers and their addresses:
@String{pub-ARTECH              = "Artech House Inc."}
@String{pub-ARTECH:adr          = "Norwood, MA, USA"}

@String{pub-AW                  = "Ad{\-d}i{\-s}on-Wes{\-l}ey"}
@String{pub-AW:adr              = "Reading, MA, USA"}

@String{pub-CAMBRIDGE           = "Cambridge University Press"}
@String{pub-CAMBRIDGE:adr       = "Cambridge, UK"}

@String{pub-CHAPMAN-HALL-CRC    = "Chapman and Hall/CRC"}
@String{pub-CHAPMAN-HALL-CRC:adr = "Boca Raton, FL, USA"}

@String{pub-CRC                 = "CRC Press"}
@String{pub-CRC:adr             = "2000 N.W. Corporate Blvd., Boca Raton, FL
                                  33431-9868, USA"}

@String{pub-ELSEVIER            = "Elsevier"}
@String{pub-ELSEVIER:adr        = "Amsterdam, The Netherlands"}

@String{pub-MCGRAW-HILL         = "Mc{\-}Graw-Hill"}
@String{pub-MCGRAW-HILL:adr     = "New York, NY, USA"}

@String{pub-NO-STARCH           = "No Starch Press"}
@String{pub-NO-STARCH:adr       = "San Francisco, CA, USA"}

@String{pub-NORTON              = "W. W. Norton \& Co."}
@String{pub-NORTON:adr          = "New York, NY, USA"}

@String{pub-OXFORD              = "Oxford University Press"}
@String{pub-OXFORD:adr          = "Walton Street, Oxford OX2 6DP, UK"}

@String{pub-PACKT               = "Packt Publishing"}
@String{pub-PACKT:adr           = "Birmingham"}

@String{pub-PH                  = "Pren{\-}tice-Hall"}
@String{pub-PH:adr              = "Upper Saddle River, NJ 07458, USA"}

@String{pub-SYNGRESS            = "Syngress Publishing, Inc."}
@String{pub-SYNGRESS:adr        = "Rockland, MA, USA"}

@String{pub-YALE                = "Yale University Press"}
@String{pub-YALE:adr            = "New Haven, CT, USA"}

%%% ====================================================================
%%% Series abbreviations:
%%% ====================================================================
%%% Bibliography entries, sorted by year, and then by citation label,
%%% with `bibsort -byyear':
@Misc{Anonymous:2020:HFI,
  author =       "Anonymous",
  title =        "History of the {Finnish Internet}",
  howpublished = "Web site",
  day =          "30",
  month =        nov,
  year =         "2020",
  bibdate =      "Thu Aug 01 07:03:05 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/internet2020.bib",
  URL =          "https://siy.fi/history-of-the-finnish-internet/",
  abstract =     "This Timeline is based on ``A History of the
                 Internet'' by Harri K. Salminen. It has been
                 complemented with details from a paper by Juha
                 Hein{\"a}nen, ``Eunet in Finland -- History''. Facts about
                 the development of the Finnish Communication and
                 Internet Exchange (FICIX) have been supplied by Jorma
                 Mellin and facts about the development of the .FI
                 top-level domain by Juhani Juselius.",
  acknowledgement = ack-nhfb,
}

@TechReport{Fidler:2020:CAU,
  author =       "Bradley Fidler and Russ Mundy",
  title =        "The Creation and Administration of Unique Identifiers,
                 1967--2017",
  type =         "{Internet Corporation for Assigned Names and Numbers
                 (ICANN)} Report",
  institution =  "????",
  pages =        "118",
  month =        nov,
  year =         "2020",
  bibdate =      "Sat Jun 05 15:56:28 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/internet2020.bib",
  URL =          "https://www.icann.org/en/system/files/files/creation-administration-unique-identifiers-1967-2017-18nov20-en.pdf",
  acknowledgement = ack-nhfb,
  remark =       "Foreword by Vinton G. Cerf and Stephen D. Crocker",
}

@Book{Menczer:2020:FCN,
  author =       "Filippo Menczer and Santo Fortunato and Clayton A.
                 Davis",
  title =        "A First Course in Network Science",
  publisher =    pub-CAMBRIDGE,
  address =      pub-CAMBRIDGE:adr,
  pages =        "xv + 258",
  year =         "2020",
  ISBN =         "1-108-47113-7 (hardcover), 1-108-65394-4 (e-book)",
  ISBN-13 =      "978-1-108-47113-8 (hardcover), 978-1-108-65394-7
                 (e-book)",
  LCCN =         "TK5105.5 .M46 2020, T57.85 .M46 2020",
  bibdate =      "Mon Aug 31 11:31:44 MDT 2020",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 https://www.math.utah.edu/pub/tex/bib/internet2020.bib",
  abstract =     "Networks are everywhere: networks of friends,
                 transportation networks and the Web. Neurons in our
                 brains and proteins within our bodies form networks
                 that determine our intelligence and survival. This
                 modern, accessible textbook introduces the basics of
                 network science for a wide range of job sectors from
                 management to marketing, from biology to engineering,
                 and from neuroscience to the social sciences. Students
                 will develop important, practical skills and learn to
                 write code for using networks in their areas of
                 interest -- even as they are just learning to program
                 with Python. Extensive sets of tutorials and homework
                 problems provide plenty of hands-on practice and longer
                 programming tutorials online further enhance students'
                 programming skills. This intuitive and direct approach
                 makes the book ideal for a first course, aimed at a
                 wide audience without a strong background in
                 mathematics or computing but with a desire to learn the
                 fundamentals and applications of network science.",
  acknowledgement = ack-nhfb,
}

@Book{vanOorschot:2021:CSI,
  author =       "Paul C. van Oorschot",
  title =        "Computer security and the {Internet}: tools and jewels
                 from malware to {Bitcoin}",
  publisher =    "Springer",
  address =      "Cham, Switzerland",
  edition =      "Second",
  pages =        "xxix + 446",
  year =         "2021",
  DOI =          "https://doi.org/10.1007/978-3-030-83411-1.",
  ISBN =         "3-030-83410-7 (hardcover), 3-030-83411-5 (e-book)",
  ISBN-13 =      "978-3-030-83410-4 (hardcover), 978-3-030-83411-1
                 (e-book)",
  LCCN =         "QA76.9.A25 V66 2021",
  bibdate =      "Mon May 5 07:17:42 MDT 2025",
  bibsource =    "fsz3950.oclc.org:210/WorldCat;
                 https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/internet2020.bib",
  series =       "Information security and cryptography",
  abstract =     "Building on the core strengths of the inaugural book,
                 this second edition of a uniquely accessible textbook
                 provides a concise, yet comprehensive overview of
                 computer and Internet security. It builds on the design
                 principles to address security-related error patterns
                 that have plagued software and system designs for more
                 than 50 years. Computer Security and the Internet is
                 elementary in that it assumes no background in
                 security, but unlike oft high-level texts it does not
                 avoid low-level details. The book reinforces
                 fundamental academic concepts with examples and also
                 relates these concepts to practical challenges and
                 real-world incidents. Its overriding focus is brevity,
                 without sacrificing breadth of core topics or technical
                 detail within them; it designates selected content as
                 optional to help readers prioritize topics. While
                 knowledge of elementary operating-system and networking
                 concepts is helpful, review sections summarize the
                 essential background. Topics and features: Delivers
                 comprehensive, technically sound explanations without
                 burdening readers with mathematical proofs or lengthy
                 source-code examples (NEW) adds chapter on wireless LAN
                 security (Wi-Fi and 802.11) (NEW) adds chapter on
                 Bitcoin and Ethereum, blockchains and cryptocurrencies
                 Integrates inline exercises and supplemental
                 per-chapter references and endnotes, bridging to
                 further topics and serving as a springboard to research
                 literature. Dives selectively into fine points for
                 exemplary topics to concretely illustrate concepts and
                 principles. Provides pointers to key surveys and
                 relevant standards, including from the Internet
                 Engineering Task Force and the U.S. National Institute
                 of Standards and Technology. Ideal for a one- or
                 two-term introductory course for junior\slash senior
                 undergraduate or first-year graduate students, this
                 textbook\slash reference is also suitable for
                 self-study by anyone seeking a solid footing in
                 security, including software developers and computing
                 professionals, technical managers, and government
                 staff. Paul C. van Oorschot is a Professor of Computer
                 Science at Carleton University (Ottawa), Canada
                 Research Chair in Authentication and Computer Security,
                 ACM Fellow, and IEEE Fellow. His earlier industrial
                 career was in telecommunications and software
                 security.",
  acknowledgement = ack-nhfb,
  subject =      "Computer security; Internet; Security measures",
  tableofcontents = "1. Security Concepts and Principles \\
                 2. Cryptographic Building Blocks \\
                 3. User Authentication passwords, Biometrics and
                 Alternatives \\
                 4. Authentication Protocols and Key Establishment.-5.
                 Operating System Security and Access Control \\
                 6. Software Security exploits and Privilege Escalation
                 \\
                 7. Malicious Software \\
                 8. Public-Key Certificate Management and Use Cases \\
                 9. Web and Browser Security \\
                 10. Firewalls and Tunnels \\
                 11. Intrusion Detection and Network-Based Attacks \\
                 12. Wireless LAN Security: 802.11 and Wi-Fi \\
                 13. Bitcoin, Blockchains and Ethereum \\
                 Epilogue \\
                 Index",
}

@TechReport{FCC:2024:SSO,
  author =       "{Federal Communications Commission}",
  title =        "Safeguarding and Securing the {Open Internet} and
                 Restoring {Internet} Freedom",
  type =         "Ruling",
  number =       "FCC 24-52",
  institution =  "Federal Communications Commission",
  address =      "Washington, DC 20554, USA",
  pages =        "513 (final 82+ missing: should be 595+)",
  day =          "7",
  month =        may,
  year =         "2024",
  bibdate =      "Thu May 09 07:53:46 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/internet2020.bib",
  URL =          "https://docs.fcc.gov/public/attachments/FCC-24-52A1.pdf",
  acknowledgement = ack-nhfb,
}

@Book{Shackelford:2024:FDR,
  author =       "Scott J. Shackelford and Scott O. Bradner",
  title =        "Forks in the Digital Road: Key Decisions in the
                 History of the {Internet}",
  publisher =    pub-OXFORD,
  address =      pub-OXFORD:adr,
  pages =        "xxiv + 207",
  month =        apr,
  year =         "2024",
  DOI =          "https://doi.org/10.1093/oso/9780197617762.001.0001",
  ISBN =         "0-19-761776-X (hardcover), 0-19-761777-8 (paperback),
                 0-19-761778-6 (e-book), 0-19-761779-4 (e-book),
                 0-19-761780-8 (e-book)",
  ISBN-13 =      "978-0-19-761776-2 (hardcover), 978-0-19-761777-9
                 (paperback), 978-0-19-761778-6 (e-book),
                 978-0-19-761779-3 (e-book), 978-0-19-761780-9
                 (e-book)",
  LCCN =         "TK5105.875.I57 .S533 2024",
  bibdate =      "Thu Aug 1 06:17:20 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/internet2020.bib",
  note =         "Foreword by Vinton G. Cerf.",
  abstract =     "Science fiction has long featured various visions of
                 cyberspace. From the original ''shared hallucination``
                 in William Gibson's \booktitle{Neuromancer}, which
                 first coined the term 'cyberspace,' to the dystopian
                 metaverse of the Matrix, authors and fans alike have
                 been fascinated by how interconnected technologies that
                 are being developed today will shape our collective
                 future, for better and worse. Less common is an urge to
                 look back and understand how decisions made by a
                 relatively small number of entrepreneurs, graduate
                 students, researchers, and government officials have
                 given us the Internet we have. But if we don't know
                 where we've been, it's tough to understand where we
                 are, to say nothing of where we're headed. This book
                 revisits some of these key decision points in the
                 history of cybersecurity and Internet governance,
                 revealing the potential alternative options that
                 existed at the time, and engage with that perennial
                 question --- what if? What if encryption had been built
                 into the Internet's architecture from the beginning?
                 What if Section 230, which shields Internet platforms
                 from civil liability, had taken a different form? What
                 if Tim-Berners Lee had taken the advice of counsel and
                 patented the World Wide Web? And what if the U.S.
                 government had not helped to establish the Internet
                 Corporation for Assigned Names and Numbers (ICANN) in
                 1998, or elected not to launch a new era of cyber
                 conflict in 2006? This book answers these questions,
                 and many more.",
  acknowledgement = ack-nhfb,
  subject =      "Internet; History; Government policy; United States;
                 Histoire; Politique gouvernementale; {\'E}tats-Unis",
  tableofcontents = "It was not just the bomb: Setting the stage: core
                 technical decisions that created the Internet \\
                 ``Layer 9'' : core policy decisions that gave us the
                 Internet we have \\
                 A flaw in the design \\
                 The web for free \\
                 Regulating online speech \\
                 Why we're still living in 1995: ISP wars and net
                 neutrality \\
                 What passed for Internet governance \\
                 Taking stock: the Internet we deserve",
}