%%% -*-BibTeX-*- %%% ==================================================================== %%% BibTeX-file{ %%% author = "Nelson H. F. Beebe", %%% version = "1.07", %%% date = "09 February 2026", %%% time = "09:25:29 MDT", %%% filename = "internet2020.bib", %%% address = "University of Utah %%% Department of Mathematics, 110 LCB %%% 155 S 1400 E RM 233 %%% Salt Lake City, UT 84112-0090 %%% USA", %%% telephone = "+1 801 581 5254", %%% URL = "https://www.math.utah.edu/~beebe", %%% checksum = "40097 466 2453 24170", %%% email = "beebe at math.utah.edu, beebe at acm.org, %%% beebe at computer.org (Internet)", %%% codetable = "ISO/ASCII", %%% keywords = "bibliography; BibTeX; Internet; network", %%% license = "public domain", %%% supported = "yes", %%% docstring = "This bibliography records books and other %%% publications about the Internet for the %%% decade 2020--2029. Earlier material is %%% covered in the companion bibliographies, %%% internet.bib, internet2000.bib, and %%% internet2010.bib. %%% %%% At version 1.07, the year coverage looked %%% like this: %%% %%% 2020 ( 3) 2022 ( 0) 2024 ( 2) %%% 2021 ( 1) 2023 ( 0) 2025 ( 1) %%% %%% Book: 4 %%% Misc: 1 %%% TechReport: 2 %%% %%% Total entries: 7 %%% %%% Numerous errors in the sources noted above %%% have been corrected. Spelling has been %%% verified with the UNIX spell and GNU ispell %%% programs using the exception dictionary %%% stored in the companion file with extension %%% .sok. %%% %%% BibTeX citation tags are uniformly chosen as %%% name:year:abbrev, where name is the family %%% name of the first author or editor, year is a %%% 4-digit number, and abbrev is a 3-letter %%% condensation of important title words. %%% Citation tags were automatically generated by %%% software developed for the BibNet Project. %%% %%% In this bibliography, entries are sorted %%% first by ascending year, and within each %%% year, alphabetically by author or editor, %%% and then, if necessary, by the 3-letter %%% abbreviation at the end of the BibTeX %%% citation tag, using the bibsort -byyear %%% utility. Year order has been chosen to %%% make it easier to identify the most recent %%% work. %%% %%% The checksum field above contains a CRC-16 %%% checksum as the first value, followed by the %%% equivalent of the standard UNIX wc (word %%% count) utility output of lines, words, and %%% characters. This is produced by Robert %%% Solovay's checksum utility.", %%% } %%% ==================================================================== @Preamble{"\input bibnames.sty " # "\input path.sty " # "\hyphenation{ }"} %%% ==================================================================== %%% Acknowledgement abbreviations: @String{ack-nhfb = "Nelson H. F. Beebe, University of Utah, Department of Mathematics, 110 LCB, 155 S 1400 E RM 233, Salt Lake City, UT 84112-0090, USA, Tel: +1 801 581 5254, e-mail: \path|beebe@math.utah.edu|, \path|beebe@acm.org|, \path|beebe@computer.org| (Internet), URL: \path|https://www.math.utah.edu/~beebe/|"} %%% ==================================================================== %%% Journal abbreviations: @String{j-J-RES-NATL-INST-STAND-TECHNOL = "Journal of Research of the National Institute of Standards and Technology"} %%% ==================================================================== %%% Publishers and their addresses: @String{pub-ARTECH = "Artech House Inc."} @String{pub-ARTECH:adr = "Norwood, MA, USA"} @String{pub-AW = "Ad{\-d}i{\-s}on-Wes{\-l}ey"} @String{pub-AW:adr = "Reading, MA, USA"} @String{pub-CAMBRIDGE = "Cambridge University Press"} @String{pub-CAMBRIDGE:adr = "Cambridge, UK"} @String{pub-CHAPMAN-HALL-CRC = "Chapman and Hall/CRC"} @String{pub-CHAPMAN-HALL-CRC:adr = "Boca Raton, FL, USA"} @String{pub-CRC = "CRC Press"} @String{pub-CRC:adr = "2000 N.W. Corporate Blvd., Boca Raton, FL 33431-9868, USA"} @String{pub-ELSEVIER = "Elsevier"} @String{pub-ELSEVIER:adr = "Amsterdam, The Netherlands"} @String{pub-MCGRAW-HILL = "Mc{\-}Graw-Hill"} @String{pub-MCGRAW-HILL:adr = "New York, NY, USA"} @String{pub-NO-STARCH = "No Starch Press"} @String{pub-NO-STARCH:adr = "San Francisco, CA, USA"} @String{pub-NORTON = "W. W. Norton \& Co."} @String{pub-NORTON:adr = "New York, NY, USA"} @String{pub-OXFORD = "Oxford University Press"} @String{pub-OXFORD:adr = "Walton Street, Oxford OX2 6DP, UK"} @String{pub-PACKT = "Packt Publishing"} @String{pub-PACKT:adr = "Birmingham"} @String{pub-PH = "Pren{\-}tice-Hall"} @String{pub-PH:adr = "Upper Saddle River, NJ 07458, USA"} @String{pub-SYNGRESS = "Syngress Publishing, Inc."} @String{pub-SYNGRESS:adr = "Rockland, MA, USA"} @String{pub-YALE = "Yale University Press"} @String{pub-YALE:adr = "New Haven, CT, USA"} %%% ==================================================================== %%% Series abbreviations: %%% ==================================================================== %%% Bibliography entries, sorted by year, and then by citation label, %%% with `bibsort -byyear': @Misc{Anonymous:2020:HFI, author = "Anonymous", title = "History of the {Finnish Internet}", howpublished = "Web site", day = "30", month = nov, year = "2020", bibdate = "Thu Aug 01 07:03:05 2024", bibsource = "https://www.math.utah.edu/pub/tex/bib/internet2020.bib", URL = "https://siy.fi/history-of-the-finnish-internet/", abstract = "This Timeline is based on ``A History of the Internet'' by Harri K. Salminen. It has been complemented with details from a paper by Juha Hein{\"a}nen, ``Eunet in Finland -- History''. Facts about the development of the Finnish Communication and Internet Exchange (FICIX) have been supplied by Jorma Mellin and facts about the development of the .FI top-level domain by Juhani Juselius.", acknowledgement = ack-nhfb, } @TechReport{Fidler:2020:CAU, author = "Bradley Fidler and Russ Mundy", title = "The Creation and Administration of Unique Identifiers, 1967--2017", type = "{Internet Corporation for Assigned Names and Numbers (ICANN)} Report", institution = "????", pages = "118", month = nov, year = "2020", bibdate = "Sat Jun 05 15:56:28 2021", bibsource = "https://www.math.utah.edu/pub/tex/bib/internet2020.bib", URL = "https://www.icann.org/en/system/files/files/creation-administration-unique-identifiers-1967-2017-18nov20-en.pdf", acknowledgement = ack-nhfb, remark = "Foreword by Vinton G. Cerf and Stephen D. Crocker", } @Book{Menczer:2020:FCN, author = "Filippo Menczer and Santo Fortunato and Clayton A. Davis", title = "A First Course in Network Science", publisher = pub-CAMBRIDGE, address = pub-CAMBRIDGE:adr, pages = "xv + 258", year = "2020", ISBN = "1-108-47113-7 (hardcover), 1-108-65394-4 (e-book)", ISBN-13 = "978-1-108-47113-8 (hardcover), 978-1-108-65394-7 (e-book)", LCCN = "TK5105.5 .M46 2020, T57.85 .M46 2020", bibdate = "Mon Aug 31 11:31:44 MDT 2020", bibsource = "fsz3950.oclc.org:210/WorldCat; https://www.math.utah.edu/pub/tex/bib/internet2020.bib", abstract = "Networks are everywhere: networks of friends, transportation networks and the Web. Neurons in our brains and proteins within our bodies form networks that determine our intelligence and survival. This modern, accessible textbook introduces the basics of network science for a wide range of job sectors from management to marketing, from biology to engineering, and from neuroscience to the social sciences. Students will develop important, practical skills and learn to write code for using networks in their areas of interest -- even as they are just learning to program with Python. Extensive sets of tutorials and homework problems provide plenty of hands-on practice and longer programming tutorials online further enhance students' programming skills. This intuitive and direct approach makes the book ideal for a first course, aimed at a wide audience without a strong background in mathematics or computing but with a desire to learn the fundamentals and applications of network science.", acknowledgement = ack-nhfb, } @Book{vanOorschot:2021:CSI, author = "Paul C. van Oorschot", title = "Computer Security and the {Internet}: Tools and Jewels from Malware to {Bitcoin}", publisher = "Springer", address = "Cham, Switzerland", edition = "Second", pages = "xxix + 446", year = "2021", DOI = "https://doi.org/10.1007/978-3-030-83411-1.", ISBN = "3-030-83410-7 (hardcover), 3-030-83411-5 (e-book)", ISBN-13 = "978-3-030-83410-4 (hardcover), 978-3-030-83411-1 (e-book)", LCCN = "QA76.9.A25 V66 2021", bibdate = "Mon May 5 07:17:42 MDT 2025", bibsource = "fsz3950.oclc.org:210/WorldCat; https://www.math.utah.edu/pub/tex/bib/bitcoin.bib; https://www.math.utah.edu/pub/tex/bib/internet2020.bib", series = "Information security and cryptography", abstract = "Building on the core strengths of the inaugural book, this second edition of a uniquely accessible textbook provides a concise, yet comprehensive overview of computer and Internet security. It builds on the design principles to address security-related error patterns that have plagued software and system designs for more than 50 years. Computer Security and the Internet is elementary in that it assumes no background in security, but unlike oft high-level texts it does not avoid low-level details. The book reinforces fundamental academic concepts with examples and also relates these concepts to practical challenges and real-world incidents. Its overriding focus is brevity, without sacrificing breadth of core topics or technical detail within them; it designates selected content as optional to help readers prioritize topics. While knowledge of elementary operating-system and networking concepts is helpful, review sections summarize the essential background. Topics and features: Delivers comprehensive, technically sound explanations without burdening readers with mathematical proofs or lengthy source-code examples (NEW) adds chapter on wireless LAN security (Wi-Fi and 802.11) (NEW) adds chapter on Bitcoin and Ethereum, blockchains and cryptocurrencies Integrates inline exercises and supplemental per-chapter references and endnotes, bridging to further topics and serving as a springboard to research literature. Dives selectively into fine points for exemplary topics to concretely illustrate concepts and principles. Provides pointers to key surveys and relevant standards, including from the Internet Engineering Task Force and the U.S. National Institute of Standards and Technology. Ideal for a one- or two-term introductory course for junior\slash senior undergraduate or first-year graduate students, this textbook\slash reference is also suitable for self-study by anyone seeking a solid footing in security, including software developers and computing professionals, technical managers, and government staff. Paul C. van Oorschot is a Professor of Computer Science at Carleton University (Ottawa), Canada Research Chair in Authentication and Computer Security, ACM Fellow, and IEEE Fellow. His earlier industrial career was in telecommunications and software security.", acknowledgement = ack-nhfb, subject = "Computer security; Internet; Security measures", tableofcontents = "1. Security Concepts and Principles \\ 2. Cryptographic Building Blocks \\ 3. User Authentication passwords, Biometrics and Alternatives \\ 4. Authentication Protocols and Key Establishment.-5. Operating System Security and Access Control \\ 6. Software Security exploits and Privilege Escalation \\ 7. Malicious Software \\ 8. Public-Key Certificate Management and Use Cases \\ 9. Web and Browser Security \\ 10. Firewalls and Tunnels \\ 11. Intrusion Detection and Network-Based Attacks \\ 12. Wireless LAN Security: 802.11 and Wi-Fi \\ 13. Bitcoin, Blockchains and Ethereum \\ Epilogue \\ Index", } @TechReport{FCC:2024:SSO, author = "{Federal Communications Commission}", title = "Safeguarding and Securing the {Open Internet} and Restoring {Internet} Freedom", type = "Ruling", number = "FCC 24-52", institution = "Federal Communications Commission", address = "Washington, DC 20554, USA", pages = "513 (final 82+ missing: should be 595+)", day = "7", month = may, year = "2024", bibdate = "Thu May 09 07:53:46 2024", bibsource = "https://www.math.utah.edu/pub/tex/bib/internet2020.bib", URL = "https://docs.fcc.gov/public/attachments/FCC-24-52A1.pdf", acknowledgement = ack-nhfb, } @Book{Shackelford:2024:FDR, author = "Scott J. Shackelford and Scott O. Bradner", title = "Forks in the Digital Road: Key Decisions in the History of the {Internet}", publisher = pub-OXFORD, address = pub-OXFORD:adr, pages = "xxiv + 207", month = apr, year = "2024", DOI = "https://doi.org/10.1093/oso/9780197617762.001.0001", ISBN = "0-19-761776-X (hardcover), 0-19-761777-8 (paperback), 0-19-761778-6 (e-book), 0-19-761779-4 (e-book), 0-19-761780-8 (e-book)", ISBN-13 = "978-0-19-761776-2 (hardcover), 978-0-19-761777-9 (paperback), 978-0-19-761778-6 (e-book), 978-0-19-761779-3 (e-book), 978-0-19-761780-9 (e-book)", LCCN = "TK5105.875.I57 .S533 2024", bibdate = "Thu Aug 1 06:17:20 2024", bibsource = "https://www.math.utah.edu/pub/tex/bib/internet2020.bib", note = "Foreword by Vinton G. Cerf.", abstract = "Science fiction has long featured various visions of cyberspace. From the original ''shared hallucination`` in William Gibson's \booktitle{Neuromancer}, which first coined the term 'cyberspace,' to the dystopian metaverse of the Matrix, authors and fans alike have been fascinated by how interconnected technologies that are being developed today will shape our collective future, for better and worse. Less common is an urge to look back and understand how decisions made by a relatively small number of entrepreneurs, graduate students, researchers, and government officials have given us the Internet we have. But if we don't know where we've been, it's tough to understand where we are, to say nothing of where we're headed. This book revisits some of these key decision points in the history of cybersecurity and Internet governance, revealing the potential alternative options that existed at the time, and engage with that perennial question --- what if? What if encryption had been built into the Internet's architecture from the beginning? What if Section 230, which shields Internet platforms from civil liability, had taken a different form? What if Tim-Berners Lee had taken the advice of counsel and patented the World Wide Web? And what if the U.S. government had not helped to establish the Internet Corporation for Assigned Names and Numbers (ICANN) in 1998, or elected not to launch a new era of cyber conflict in 2006? This book answers these questions, and many more.", acknowledgement = ack-nhfb, subject = "Internet; History; Government policy; United States; Histoire; Politique gouvernementale; {\'E}tats-Unis", tableofcontents = "It was not just the bomb: Setting the stage: core technical decisions that created the Internet \\ ``Layer 9'' : core policy decisions that gave us the Internet we have \\ A flaw in the design \\ The web for free \\ Regulating online speech \\ Why we're still living in 1995: ISP wars and net neutrality \\ What passed for Internet governance \\ Taking stock: the Internet we deserve", } @Book{Alexander:2025:GIC, author = "Fiona M. Alexander and Laura DeNardis and Nanette S. Levinson and Francesca Musiani", title = "Geopolitics at the {Internet}'s core", publisher = "Palgrave Macmillan", address = "Cham, Switzerland", pages = "xxv + 245", year = "2025", DOI = "https://doi.org/10.1007/978-3-031-89478-7", ISBN = "3-031-89477-4, 3-031-89478-2 (e-book)", ISBN-13 = "978-3-031-89477-0, 978-3-031-89478-7 (e-book)", ISSN = "2946-3300", LCCN = "HM851", bibdate = "Mon Feb 9 06:18:03 MST 2026", bibsource = "fsz3950.oclc.org:210/WorldCat; https://www.math.utah.edu/pub/tex/bib/internet2020.bib", series = "Information Technology and Global Governance", abstract = "Contentious geopolitical conflicts over digital technologies have arisen around a complex set of technical specifications at the Internet's core. One of these is the Internet Protocol (IP), designed for addressing and routing information to its destination. China redesigning the Internet? Ukraine asking that Russia be disconnected from the Internet? The U.S. 'surrendering' the Internet? The Internet Protocol --- rightly or not --- has been at the center of many digital policy concerns for decades. In examining entanglements between IP and public interest issues, \booktitle{Geopolitics at the Internet's Core} illuminates how technical infrastructure is now a proxy for political and economic power. Ongoing global controversies over the Internet Protocol ecosystem hint at its importance and why IP is a flashpoint mediating broader conflicts in various cultural and historic contexts. \booktitle{Geopolitics at the Internet's Core} analyzes the trajectory and possible futures of the Internet Protocol as a space mediating geopolitical and domestic controversies in an increasingly contentious digital world; it explains the IP ecosystem, a complex combination of virtual resources, abstract specifications, tangible infrastructure, functionally specific systems, and the institutions and rules that design and govern these systems. With a view toward the future and insights into the governance of emerging technologies, this book identifies eight IP-related levers of power that illuminate technology governance debates. Opening up the black box of the Internet Protocol and related global governance challenges, it explains the political battles and the stakes of these battles at the heart of the Internet.", acknowledgement = ack-nhfb, subject = "Internet; Political aspects; TCP/IP (Computer network protocol); Aspect politique; TCP/IP (Protocole de r{\'e}seaux d'ordinateurs); Geopolitics; Political aspects", tableofcontents = "1: Internet Protocol Politics \\ 2: A Radical Governance Innovation \\ 3: Technical Design as Governance \\ 4: The Internet Address Space as a Geopolitical Space \\ 5: A Twenty Year Control Struggle from US Stewardship to Private Governance \\ 6: The Internet Protocol and Content Battles \\ 7: Internet Protocol Security Entanglements with Geopolitics \\ 8: The Role of the Internet Protocol Ecosystem in Inclusion \\ 9: Geopolitical and Technical Futures of the Internet Protocol", }