{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T03:46:36Z","timestamp":1725680796431},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642300448"},{"type":"electronic","value":"9783642300455"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-30045-5_20","type":"book-chapter","created":{"date-parts":[[2012,5,15]],"date-time":"2012-05-15T04:33:29Z","timestamp":1337056409000},"page":"259-273","source":"Crossref","is-referenced-by-count":0,"title":["Sign What You Really Care about \u2013 Secure BGP AS Paths Efficiently"],"prefix":"10.1007","author":[{"given":"Yang","family":"Xiang","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Zhiliang","family":"Wang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jianping","family":"Wu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Xingang","family":"Shi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Xia","family":"Yin","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"20_CR1","unstructured":"The routeviews project (2009), \n                    \n                      http:\/\/www.routeviews.org"},{"key":"20_CR2","unstructured":"Alaettinoglu, C., Villamizar, C., Gerich, E., Kessens, D., Meyer, D., Bates, T., Karrenberg, D., Terpstra, M.: RFC 2622, routing policy specification language, RPSL (1999), \n                    \n                      http:\/\/tools.ietf.org\/html\/rfc2622"},{"key":"20_CR3","unstructured":"Bellovin, S.M., Gansner, E.R.: Using link cuts to attack Internet routing (2003), \n                    \n                      http:\/\/hdl.handle.net\/10022\/AC:P:9052"},{"issue":"6","key":"20_CR4","doi-asserted-by":"publisher","first-page":"681","DOI":"10.1109\/90.974523","volume":"9","author":"L. Gao","year":"2001","unstructured":"Gao, L., Rexford, J.: Stable Internet routing without global coordination. IEEE\/ACM Trans. Netw.\u00a09(6), 681\u2013692 (2001)","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"20_CR5","doi-asserted-by":"crossref","unstructured":"Goldberg, S., Schapira, M., Hummon, P., Rexford, J.: How secure are secure interdomain routing protocols? In: SIGCOMM (2010)","DOI":"10.1145\/1851182.1851195"},{"key":"20_CR6","unstructured":"Goodell, G., Aiello, W., Griffin, T., Ioannidis, J., McDaniel, P.D., Rubin, A.D.: Working around BGP: An incremental approach to improving security and accuracy in interdomain routing. In: NDSS (2003)"},{"key":"20_CR7","doi-asserted-by":"crossref","unstructured":"Hu, Y.C., Perrig, A., Sirbu, M.A.: SPV: secure path vector routing for securing BGP. In: SIGCOMM, pp. 179\u2013192 (2004)","DOI":"10.1145\/1030194.1015488"},{"key":"20_CR8","doi-asserted-by":"crossref","unstructured":"Karlin, J., Forrest, S., Rexford, J.: Pretty good BGP: Improving BGP by cautiously adopting routes. In: ICNP, pp. 290\u2013299 (2006)","DOI":"10.1109\/ICNP.2006.320179"},{"key":"20_CR9","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1109\/49.839934","volume":"18","author":"S. Kent","year":"2000","unstructured":"Kent, S., Lynn, C., Mikkelson, J., Seo, K.: Secure border gateway protocol (S-BGP). IEEE Journal on Selected Areas in Communications\u00a018, 103\u2013116 (2000)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"3-4","key":"20_CR10","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1016\/j.simpat.2003.10.003","volume":"12","author":"D.M. Nicol","year":"2004","unstructured":"Nicol, D.M., Smith, S.W., Zhao, M.: Evaluation of efficient security for BGP route announcements using parallel simulation. Simulation Modelling Practice and Theory\u00a012(3-4), 187\u2013216 (2004)","journal-title":"Simulation Modelling Practice and Theory"},{"key":"20_CR11","doi-asserted-by":"crossref","unstructured":"Oliveira, R., Zhang, B., Pei, D., Izhak-Ratzin, R., Zhang, L.: Quantifying path exploration in the Internet. In: Proc. of the 6th ACM SIGCOMM Internet Measurement Conference (IMC), Rio de Janeriro, Brazil (2006)","DOI":"10.1145\/1177080.1177116"},{"key":"20_CR12","doi-asserted-by":"crossref","unstructured":"van Oorschot, P.C., Wan, T., Kranakis, E.: On interdomain routing security and pretty secure BGP (psBGP). ACM Trans. Inf. Syst. Secur.\u00a010(3) (2007)","DOI":"10.1145\/1266977.1266980"},{"key":"20_CR13","unstructured":"Rekhter, Y., Li, T., Hares, S.: RFC 4271: Border gateway protocol 4 (2006), \n                    \n                      http:\/\/tools.ietf.org\/html\/rfc4271"},{"key":"20_CR14","unstructured":"RIPE: Youtube hijacking: A ripe ncc ris case study (2008), \n                    \n                      http:\/\/www.ripe.net\/news\/study-youtube-hijacking.html"},{"key":"20_CR15","unstructured":"RIPE NCC: Resource certification (2011), \n                    \n                      http:\/\/ripe.net\/certification\/"},{"key":"20_CR16","unstructured":"Subramanian, L., Roth, V., Stoica, I., Shenker, S., Katz, R.H.: Listen and whisper: Security mechanisms for BGP. In: NSDI, pp. 127\u2013140 (2004)"},{"key":"20_CR17","unstructured":"Turner, S.: BGP algorithms, key formats, & signature formats (2011), \n                    \n                      http:\/\/tools.ietf.org\/html\/draft-ietf-sidr-bgpsec-algs"},{"key":"20_CR18","doi-asserted-by":"crossref","unstructured":"Wang, J.H., Chiu, D.M., Lui, J.C.S., Chang, R.K.C.: Inter-as inbound traffic engineering via ASPP. Transactions On Network And Service Management\u00a03(1) (2007)","DOI":"10.1109\/TNSM.2007.030106"},{"key":"20_CR19","unstructured":"White, R.: Architecture and deployment considerations for secure origin BGP (2006), \n                    \n                      http:\/\/tools.ietf.org\/html\/draft-white-sobgp-architecture"},{"key":"20_CR20","doi-asserted-by":"crossref","unstructured":"Xiang, Y., Yin, X., Wang, Z., Wu, J.: Internet flattening: Monitoring and analysis of inter-domain routing. In: IEEE ICC (2011)","DOI":"10.1109\/icc.2011.5962885"},{"key":"20_CR21","unstructured":"Zmijewski, E.: Threats to internet routing and global connectivity (2008), \n                    \n                      http:\/\/www.renesys.com\/tech\/presentations\/pdf\/20thAnnualFIRST.pdf"}],"container-title":["Lecture Notes in Computer Science","NETWORKING 2012"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-30045-5_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T00:39:42Z","timestamp":1558312782000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-30045-5_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642300448","9783642300455"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-30045-5_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}