{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,4,30]],"date-time":"2024-04-30T13:40:02Z","timestamp":1714484402460},"reference-count":18,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2012,10,31]],"date-time":"2012-10-31T00:00:00Z","timestamp":1351641600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2014,1]]},"DOI":"10.1007\/s11432-012-4659-7","type":"journal-article","created":{"date-parts":[[2012,10,20]],"date-time":"2012-10-20T06:29:17Z","timestamp":1350714557000},"page":"1-13","source":"Crossref","is-referenced-by-count":0,"title":["A secure routing model based on distance vector routing algorithm"],"prefix":"10.1007","volume":"57","author":[{"given":"Bin","family":"Wang","sequence":"first","affiliation":[]},{"given":"ChunMing","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Qiang","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Pan","family":"Lai","sequence":"additional","affiliation":[]},{"given":"JuLong","family":"Lan","sequence":"additional","affiliation":[]},{"given":"YunFei","family":"Guo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,10,31]]},"reference":[{"key":"4659_CR1","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1145\/378444.378449","volume":"19","author":"SM Bellovin","year":"1989","unstructured":"Bellovin S.M. Security problems in the TCP\/IP protocol suite. Comput Commun Rev, 1989, 19: 32\u201348","journal-title":"Comput Commun Rev"},{"key":"4659_CR2","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1109\/TPDS.2008.73","volume":"20","author":"C F Kuo","year":"2009","unstructured":"Kuo C F, Pang A C, Chan S K. Dynamic routing with security considerations. IEEE Trans Parallel Distrib Syst, 2009, 20: 48\u201358","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"4659_CR3","doi-asserted-by":"crossref","first-page":"180","DOI":"10.1007\/s10550-006-0107-9","volume":"24","author":"L He","year":"2006","unstructured":"He L. Recent developments in securing Internet routing protocols. BT Technol J, 2006, 24: 180\u2013196","journal-title":"BT Technol J"},{"key":"4659_CR4","first-page":"241","volume-title":"ACM SIGCOMM 2007","author":"K Lakshminarayanan","year":"2007","unstructured":"Lakshminarayanan K, Caesar M, Rangan M, et al. Achieving convergence-free routing using failure-carrying packets. In: ACM SIGCOMM 2007. New York: ACM Press, 2007. 241\u2013252"},{"key":"4659_CR5","first-page":"659","volume":"11","author":"B Wang","year":"2010","unstructured":"Wang B, Guo Y F, Lan J L, et al. Fast network self-healing mechanism based on distance vector routing protocol. J Internet Technol, 2010, 11: 659\u2013667","journal-title":"J Internet Technol"},{"key":"4659_CR6","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1002\/sec.135","volume":"3","author":"H Kim","year":"2010","unstructured":"Kim H, Shin G. On predictive routing of security contexts in an all-IP network. Secur Commun Netw, 2010, 3: 4\u201315","journal-title":"Secur Commun Netw"},{"key":"4659_CR7","first-page":"54","volume":"11","author":"K Rick","year":"2009","unstructured":"Rick K, Simon L, Hart R. Practical interdomain routing security. IT Prof, 2009, 11: 54\u201356","journal-title":"IT Prof"},{"key":"4659_CR8","first-page":"2624","volume-title":"IEEE INFOCOM 2011","author":"L Jun","year":"2011","unstructured":"Jun L, Brooks S. I-seismograph: Observing and measuring Internet earthquakes. In: IEEE INFOCOM 2011. Washington: IEEE Computer Society, 2011. 2624\u20132632"},{"key":"4659_CR9","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1090\/qam\/102435","volume":"XVI","author":"R Bellman","year":"1958","unstructured":"Bellman R. On a routing problem. Q Appl Math, 1958, XVI: 87\u201390","journal-title":"Q Appl Math"},{"key":"4659_CR10","volume-title":"Information Assurance: Dependability and Security in Networked Systems","author":"Q Yi","year":"2007","unstructured":"Yi Q, James J, David T, et al. Information Assurance: Dependability and Security in Networked Systems. San Fransisco: Morgan Kaufmann Publishers, 2007"},{"key":"4659_CR11","first-page":"475","volume-title":"Proc of IEEE INFOCOM","author":"Z Haim","year":"2008","unstructured":"Haim Z, Levy H. Area avoidance routing in distance-vector networks. In: Proc of IEEE INFOCOM. Washington: IEEE Computer Society, 2008. 475\u2013483"},{"key":"4659_CR12","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1145\/586110.586129","volume-title":"Proc of CCS'02","author":"V Mittal","year":"2002","unstructured":"Mittal V, Vigna G. Sensor-based intrusion detection for intra-domain distance-vector routing. In: Proc of CCS'02. Washington: IEEE Computer Society, 2002. 127\u2013137"},{"key":"4659_CR13","first-page":"1","volume-title":"Proc NDSS'03","author":"Y C Hu","year":"2003","unstructured":"Hu Y C, Perrig A, Johnson D B. Efficient security mechanisms for routing protocols. In: Proc NDSS'03. San Diego: IEEE Computer Society, 2003. 1\u201317"},{"key":"4659_CR14","first-page":"103","volume-title":"Proc of 2006 Securecomm and Workshops","author":"W Tao","year":"2006","unstructured":"Tao W, Kranakis E, Oorschot P. S-RIP: A secure distance vector routing protocol. In: Proc of 2006 Securecomm and Workshops. Washington: IEEE Computer Society, 2006. 103\u2013109"},{"key":"4659_CR15","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/SECCOMW.2006.359578","volume-title":"Proc of 2006 Securecomm and Workshops","author":"A Babakhouya","year":"2006","unstructured":"Babakhouya A, Challal Y, Bouabdallah M, et al. SDV: A new approach to secure distance vector routing protocols. In: Proc of 2006 Securecomm and Workshops. Washington: IEEE Computer Society, 2006. 1\u201310"},{"key":"4659_CR16","doi-asserted-by":"crossref","first-page":"1308","DOI":"10.1109\/JSAC.2010.101008","volume":"28","author":"B Sheng","year":"2010","unstructured":"Sheng B, Wang H N, Pan J P. Keychain-based signatures for securing BGP. IEEE J Sel Areas Commun, 2010, 28: 1308\u20131318","journal-title":"IEEE J Sel Areas Commun"},{"key":"4659_CR17","doi-asserted-by":"crossref","first-page":"1803","DOI":"10.1109\/TIT.2010.2091434","volume":"57","author":"G Neven","year":"2011","unstructured":"Neven G. Efficient sequential aggregate signed data. IEEE Trans Inf Theory, 2011, 57: 1803\u20131815","journal-title":"IEEE Trans Inf Theory"},{"key":"4659_CR18","doi-asserted-by":"crossref","first-page":"2482","DOI":"10.1016\/j.comnet.2010.04.008","volume":"54","author":"L Zhang","year":"2010","unstructured":"Zhang L, Qina B, Wu Q H, et al. Efficient many-to-one authentication with certificateless aggregate signatures. Comput Netw, 2010, 54: 2482\u20132491","journal-title":"Comput Netw"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-012-4659-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11432-012-4659-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-012-4659-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,30]],"date-time":"2024-04-30T13:04:13Z","timestamp":1714482253000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11432-012-4659-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10,31]]},"references-count":18,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2014,1]]}},"alternative-id":["4659"],"URL":"https:\/\/doi.org\/10.1007\/s11432-012-4659-7","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"value":"1674-733X","type":"print"},{"value":"1869-1919","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,10,31]]}}}