{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T11:40:46Z","timestamp":1742384446520},"reference-count":26,"publisher":"Elsevier BV","issue":"3","license":[{"start":{"date-parts":[[1998,3,1]],"date-time":"1998-03-01T00:00:00Z","timestamp":888710400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Communications"],"published-print":{"date-parts":[[1998,3]]},"DOI":"10.1016\/s0140-3664(97)00186-2","type":"journal-article","created":{"date-parts":[[2002,7,25]],"date-time":"2002-07-25T15:03:07Z","timestamp":1027609387000},"page":"203-210","source":"Crossref","is-referenced-by-count":18,"title":["Efficient security mechanisms for the border gateway routing protocol"],"prefix":"10.1016","volume":"21","author":[{"given":"Bradley R.","family":"Smith","sequence":"first","affiliation":[]},{"given":"J.J.","family":"Garcia-Luna-Aceves","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0140-3664(97)00186-2_BIB1","article-title":"A Border Gateway Protocol 4 (BGP-4)","author":"Rekhter","year":"1995","journal-title":"RFC 1771"},{"key":"10.1016\/S0140-3664(97)00186-2_BIB2","first-page":"61","article-title":"Inter-domain routing protocol (IDRP)","volume":"4","author":"Rekhter","year":"1993","journal-title":"Internetworking: Research and Experience"},{"key":"10.1016\/S0140-3664(97)00186-2_BIB3","article-title":"Information technology\u2014Telecommunications and information exchange between system\u2014Protocol for exchange of inter-domain routing information among intermediate systems to support forwarding of ISO 8473 PDUs","author":"International Standards Orgainization","year":"1994","journal-title":"ISO\/IEC 10747"},{"key":"10.1016\/S0140-3664(97)00186-2_BIB4","article-title":"RIP Version 2: Carrying Additional Information","author":"Malkin","year":"1994","journal-title":"RFC 1723"},{"key":"10.1016\/S0140-3664(97)00186-2_BIB5","series-title":"Proc. Symposium on Network and Distributed System Security","article-title":"Digital signature protection of the OSPF routing protocol","author":"Murphy","year":"1996"},{"key":"10.1016\/S0140-3664(97)00186-2_BIB6","series-title":"Routing Arbiter Architecture","author":"Estrin","year":"1994"},{"key":"10.1016\/S0140-3664(97)00186-2_BIB7","article-title":"Domain Name System Security Extensions","author":"Eastlake","year":"1996","journal-title":"Internet draft: draft-ietf-dnssec-secext-10.txt"},{"key":"10.1016\/S0140-3664(97)00186-2_BIB8","article-title":"A Weakness in the 4.2BSD Unix TCP\/IP Software","author":"Morris","year":"1985"},{"key":"10.1016\/S0140-3664(97)00186-2_BIB9","series-title":"Proc. 5th USENIX UNIX Security Symposium","first-page":"7","article-title":"A simple active attack against TCP","author":"Joncheray","year":"1995"},{"issue":"3","key":"10.1016\/S0140-3664(97)00186-2_BIB10","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1145\/74674.74675","article-title":"Comments on ls\/Security problems in the TCP\/IP protocol suite\/rs","volume":"19","author":"Kent","year":"1989","journal-title":"ACM Computer Commun. Review"},{"issue":"4","key":"10.1016\/S0140-3664(97)00186-2_BIB11","doi-asserted-by":"crossref","first-page":"277","DOI":"10.1145\/357401.357402","article-title":"End-to-end arguments in system design","volume":"2","author":"Saltzer","year":"1984","journal-title":"ACM Trans, on Computer Systems"},{"issue":"2","key":"10.1016\/S0140-3664(97)00186-2_BIB12","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1145\/356909.356913","article-title":"Security mechanisms in high level network protocols","volume":"15","author":"Voydock","year":"1983","journal-title":"ACM Computing Surveys"},{"issue":"1","key":"10.1016\/S0140-3664(97)00186-2_BIB13","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1109\/90.222907","article-title":"A protocol for route establishment and packet forwarding across multidomain internets","volume":"1","author":"Estrin","year":"1993","journal-title":"IEEE Trans. on Networking"},{"key":"10.1016\/S0140-3664(97)00186-2_BIB14","series-title":"CRYPTO'85","first-page":"108","article-title":"Security for the DoD Transmission Control Protocol","author":"Diffie","year":"1985"},{"key":"10.1016\/S0140-3664(97)00186-2_BIB15","article-title":"Some Thoughts on TCP and Communication Security","author":"Kent","year":"1977","journal-title":"MIT Laboratory for Computer Science, Local Network Note No. 6"},{"issue":"7","key":"10.1016\/S0140-3664(97)00186-2_BIB16","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1109\/MCOM.1985.1092610","article-title":"Standardizing cryptographic services at OSI higher layers","volume":"23","author":"Tardo","year":"1985","journal-title":"IEEE Communication Magazine"},{"key":"10.1016\/S0140-3664(97)00186-2_BIB17","article-title":"Security Architecture for the Internet Protocol","author":"Atkinson","year":"1995","journal-title":"RFC 1825"},{"key":"10.1016\/S0140-3664(97)00186-2_BIB18","article-title":"Public Key Encryption Support for TCP","author":"Joncheray","year":"1995","journal-title":"Internet Draft: draft-joncheray-encryption-00.txt"},{"issue":"2","key":"10.1016\/S0140-3664(97)00186-2_BIB19","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1109\/32.214834","article-title":"Trust requirements and performance of a fast subtransport-level protocol for secure communication","volume":"19","author":"Rangan","year":"1993","journal-title":"IEEE Transactions on Software Engineering"},{"key":"10.1016\/S0140-3664(97)00186-2_BIB20","article-title":"Network Layer Protocols with Byzantine Robustness","author":"Perlman","year":"1988"},{"key":"10.1016\/S0140-3664(97)00186-2_BIB21","series-title":"Proc. ISOC Symposium on Network and Distributed System Security","first-page":"85","article-title":"Securing Distance-Vector Routing Protocols","author":"Smith","year":"1997"},{"issue":"2","key":"10.1016\/S0140-3664(97)00186-2_BIB22","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1145\/153949.153953","article-title":"Integration of security in network routing protocols","volume":"11","author":"Kumar","year":"1993","journal-title":"ACM SIGSAC Review"},{"key":"10.1016\/S0140-3664(97)00186-2_BIB23","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1145\/165611.165615","article-title":"Integrating security in inter-domain routing protocols","author":"Kumar","year":"1993","journal-title":"ACM Computer Commun. Review"},{"key":"10.1016\/S0140-3664(97)00186-2_BIB24","series-title":"Symposium on Network and Distributed System Security","article-title":"Presentation in panel on ls\/security architecture for the internet infrastructure\/rs","author":"Murphy","year":"1995"},{"key":"10.1016\/S0140-3664(97)00186-2_BIB25","series-title":"Proc. IEEE Global Internet '96","article-title":"Securing the Border Gateway Routing Protocol","author":"Smith","year":"1996"},{"issue":"1","key":"10.1016\/S0140-3664(97)00186-2_BIB26","doi-asserted-by":"crossref","first-page":"148","DOI":"10.1109\/90.554729","article-title":"A path-finding algorithm for loop-free routing","volume":"5","author":"Garcia-Luna-Aceves","year":"1997","journal-title":"IEEE\/ACM Transactions on Networking"}],"container-title":["Computer Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0140366497001862?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0140366497001862?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,4,22]],"date-time":"2019-04-22T23:20:23Z","timestamp":1555975223000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0140366497001862"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998,3]]},"references-count":26,"journal-issue":{"issue":"3","published-print":{"date-parts":[[1998,3]]}},"alternative-id":["S0140366497001862"],"URL":"https:\/\/doi.org\/10.1016\/s0140-3664(97)00186-2","relation":{},"ISSN":["0140-3664"],"issn-type":[{"value":"0140-3664","type":"print"}],"subject":[],"published":{"date-parts":[[1998,3]]}}}