{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T19:06:07Z","timestamp":1742929567472,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":33,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540222170"},{"type":"electronic","value":"9783540248521"}],"license":[{"start":{"date-parts":[[2004,1,1]],"date-time":"2004-01-01T00:00:00Z","timestamp":1072915200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24852-1_8","type":"book-chapter","created":{"date-parts":[[2010,9,10]],"date-time":"2010-09-10T22:37:21Z","timestamp":1284158241000},"page":"103-119","source":"Crossref","is-referenced-by-count":10,"title":["S-RIP: A Secure Distance Vector Routing Protocol"],"prefix":"10.1007","author":[{"given":"Tao","family":"Wan","sequence":"first","affiliation":[]},{"given":"Evangelos","family":"Kranakis","sequence":"additional","affiliation":[]},{"given":"Paul C.","family":"van Oorschot","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"doi-asserted-by":"crossref","unstructured":"Baker, F., Atkinson, R.: RIP-II MD5 Authentication. RFC 2082 (January 1997)","key":"8_CR1","DOI":"10.17487\/rfc2082"},{"issue":"2","key":"8_CR2","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1145\/378444.378449","volume":"19","author":"S.M. Bellovin","year":"1989","unstructured":"Bellovin, S.M.: Security Problems in the TCP\/IP Protocol Suite. ACM Computer Communications Review\u00a019(2), 32\u201348 (1989)","journal-title":"ACM Computer Communications Review"},{"doi-asserted-by":"crossref","unstructured":"Case, J., Fedor, M., Schoffstall, M., Davin, J.: A Simple Network Management Protocol (SNMP). RFC 1157 (May 1990)","key":"8_CR3","DOI":"10.17487\/rfc1157"},{"doi-asserted-by":"crossref","unstructured":"Deering, S., Hares, S., Perkins, C., Perlman, R.: Overview of the 1998 IAB Routing Workshop (RFC 2902) (August 2000)","key":"8_CR4","DOI":"10.17487\/rfc2902"},{"key":"8_CR5","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1214\/aoms\/1177698950","volume":"28","author":"A.P. Dempster","year":"1967","unstructured":"Dempster, A.P.: Upper and Lower Probabilities Induced by a Multivalued Mapping. The Annals of Statistics\u00a028, 325\u2013339 (1967)","journal-title":"The Annals of Statistics"},{"unstructured":"Garcia-Luna-Aceves, J.J., Murthy, S.: A Loop-Free Algorithm Based on Predecessor Information. In: Proceedings of IEEE INFOCOM, Boston, MA, USA (April 1995)","key":"8_CR6"},{"unstructured":"Goodell, G., Aiello, W., Griffin, T., Ioannidis, J., McDaniel, P., Rubin, A.: Working around BGP:AnIncrementalApproach to Improving Security andAccuracy in Interdomain Routing. In: Proc. of NDSS\u201903, San Diego, USA (February 2003)","key":"8_CR7"},{"doi-asserted-by":"crossref","unstructured":"Hedrick, C.: Routing Information Protocol. RFC 1058 (June 1988)","key":"8_CR8","DOI":"10.17487\/rfc1058"},{"unstructured":"Hu, Y.C., Perrig, A., Johnson, D.B.: Efficient Security Mechanisms for Routing Protocols. In: Proc. NDSS 2003, San Diego, USA (February 2003)","key":"8_CR9"},{"unstructured":"Hu, Y.C., Perrig, A., Johnson, D.B.: Packet Leashes:A Defense againstWormhole Attacks in Wireless Networks. In: Proc. of IEEE INFOCOM 2003, San Francisco, USA (April 2003)","key":"8_CR10"},{"key":"8_CR11","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1016\/S1570-8705(03)00019-2","volume":"1","author":"Y.C. Hu","year":"2003","unstructured":"Hu, Y.C., Johnson, D.B., Perrig, A.: SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks. Ad Hoc Networks Journal\u00a01, 175\u2013192 (2003)","journal-title":"Ad Hoc Networks Journal"},{"doi-asserted-by":"crossref","unstructured":"Just, M., Kranakis, E., Wan, T.: Resisting Malicious Packet Dropping in Wireless Ad Hoc Networks. In: Proc. of ADHOCNOW 2003, Montreal, Canada (October 2003)","key":"8_CR12","DOI":"10.1007\/978-3-540-39611-6_14"},{"doi-asserted-by":"crossref","unstructured":"Kent, S., Atkinson, R.: IP Encapsulating Security Payload. RFC 2406 (November 1998)","key":"8_CR13","DOI":"10.17487\/rfc2406"},{"issue":"4","key":"8_CR14","doi-asserted-by":"publisher","first-page":"582","DOI":"10.1109\/49.839934","volume":"18","author":"S. Kent","year":"2000","unstructured":"Kent, S., Lynn, C., Seo, K.: Secure Border Gateway Protocol (Secure-BGP). IEEE Journal on Selected Areas in Communications\u00a018(4), 582\u2013592 (2000)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"doi-asserted-by":"crossref","unstructured":"Malkin, G.: RIP Version 2. RFC 2453 (Standard) (November 1998)","key":"8_CR15","DOI":"10.17487\/rfc2453"},{"issue":"12","key":"8_CR16","doi-asserted-by":"publisher","first-page":"1802","DOI":"10.1109\/TCOM.1978.1094040","volume":"26","author":"J.M. McQuillan","year":"1978","unstructured":"McQuillan, J.M., Falk, G., Richer, I.: A Review of the Development and Performance of the ARPANET Routing Algorithm. IEEE Trans. on Comm.\u00a026(12), 1802\u20131811 (1978)","journal-title":"IEEE Trans. on Comm."},{"key":"8_CR17","doi-asserted-by":"publisher","DOI":"10.1201\/9781439821916","volume-title":"Handbook of Applied Cryptography","author":"A.J. Menezes","year":"1996","unstructured":"Menezes, A.J., van Oorschot, P.C., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)"},{"doi-asserted-by":"crossref","unstructured":"Mittal, V., Vigna, G.: Sensor-Based Intrusion Detection for Intra-Domain Distance-Vector Routing. In: Proc. of CCS 2002, Washington, D.C., USA (November 2002)","key":"8_CR18","DOI":"10.1145\/586110.586129"},{"unstructured":"Murphy, S.L., Badger, M.R.: Digital Signature Protection of the OSPF Routing Protocol. In: Proc. of NDSS 1996, San Diego, USA (April 1996)","key":"8_CR19"},{"doi-asserted-by":"crossref","unstructured":"Padmanabhan, V.N., Simon, D.R.: Secure Traceroute to Detect Faulty or Malicious Routing. In: ACM SIGCOMM Workshop on Hot Topic in Networks, Princeton, NJ, USA (October 2002)","key":"8_CR20","DOI":"10.1145\/774763.774775"},{"unstructured":"Pei, D., Massey, D., Zhang, L.: Detection of Invalid Announcements in RIP protocols. In: IEEE Globecom 2003, San Francisco, California, USA (December 2003)","key":"8_CR21"},{"unstructured":"Perlman, R.: Network Layer Protocols with Byzantine Robustness. PhD thesis, MIT (1988)","key":"8_CR22"},{"key":"8_CR23","volume-title":"Interconnections: Bridges and Routers","author":"R. Perlman","year":"1992","unstructured":"Perlman, R.: Interconnections: Bridges and Routers. Addison-Wesley, Reading (1992)"},{"doi-asserted-by":"crossref","unstructured":"Rekhter, Y., Li, T.: A Border Gateway Protocol 4 (BGP-4), RFC 1771 (March 1995)","key":"8_CR24","DOI":"10.17487\/rfc1771"},{"issue":"12","key":"8_CR25","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1145\/355112.355122","volume":"43","author":"P. Resnick","year":"2000","unstructured":"Resnick, P., Zeckhauser, R., Friedman, E., Kuwabara, K.: Reputation systems: Facilitating trust in Internet interactions. Communications of the ACM\u00a043(12), 45\u201348 (2000)","journal-title":"Communications of the ACM"},{"doi-asserted-by":"crossref","unstructured":"Rivest, R.: The MD5 Message-Digest Algorithm, RFC 1321 (April 1992)","key":"8_CR26","DOI":"10.17487\/rfc1321"},{"key":"8_CR27","doi-asserted-by":"crossref","DOI":"10.1515\/9780691214696","volume-title":"A Mathematical Theory of Evidence","author":"G. Shafer","year":"1976","unstructured":"Shafer, G.: A Mathematical Theory of Evidence. Princeton University Press, Princeton (1976)"},{"unstructured":"Smith, B.R., Garcia-Luna-Aceves, J.J.: Securing the Border Gateway Routing Protocol. In: Proceedings of Global Internet 1996, London, UK (November 1996)","key":"8_CR28"},{"unstructured":"Smith, B.R., Murphy, S., Garcia-Luna-Aceves, J.J.: Securing Distance-Vector Routing Protocols. In: Proc. of NDSS 1997, San Diego, USA (February 1997)","key":"8_CR29"},{"unstructured":"Wan, T., Kranakis, E., van Oorschot, P.C.: Secure Routing Protocols Using Consistency Checks and S-RIP. Technical Report TR-03-09, School of Computer Science, Carleton University, Ottawa, Canada (October 2003)","key":"8_CR30"},{"unstructured":"Wang, F.Y., Wu, F.S.: On the Vulnerablity and Protection of OSPF Routing Protocol. In: Proceedings of IEEE Seventh International Conference on Computer Communications and Networks, Lafayette, LA, USA, October 12-15 (1998)","key":"8_CR31"},{"issue":"3","key":"8_CR32","first-page":"15","volume":"6","author":"R. White","year":"2003","unstructured":"White, R.: Securing BGP Through Secure Origin BGP. The Internet Protocol Journal\u00a06(3), 15\u201322 (2003)","journal-title":"The Internet Protocol Journal"},{"issue":"4","key":"8_CR33","doi-asserted-by":"publisher","first-page":"535","DOI":"10.1111\/1467-8640.00202","volume":"18","author":"B. Yu","year":"2002","unstructured":"Yu, B., Singh, M.P.: Distributed Reputation Management for Electronic Commerce. Computational Intelligence\u00a018(4), 535\u2013549 (2002)","journal-title":"Computational Intelligence"}],"container-title":["Lecture Notes in Computer Science","Applied Cryptography and Network Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24852-1_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,9]],"date-time":"2021-11-09T14:08:54Z","timestamp":1636466934000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24852-1_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540222170","9783540248521"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24852-1_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}