{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T04:32:10Z","timestamp":1725424330226},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,1]]},"DOI":"10.1109\/comsnets.2011.5716503","type":"proceedings-article","created":{"date-parts":[[2011,2,18]],"date-time":"2011-02-18T19:10:46Z","timestamp":1298056246000},"page":"1-11","source":"Crossref","is-referenced-by-count":2,"title":["Hierarchical networks with Byzantine Robustness"],"prefix":"10.1109","author":[{"given":"R","family":"Perlman","sequence":"first","affiliation":[]},{"given":"C","family":"Kaufman","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1015467.1015488"},{"journal-title":"ISO","article-title":"Information technology&#x2013;&#x2013;Telecommunications and information exchange between systems &#x2013;&#x2013; Intermediate system to Intermediate system intra-domain routing information exchange protocol for use in conjunction with the protocol for providing the connectionless-mode Network Service (ISO 8473)","year":"0","key":"ref11"},{"key":"ref12","article-title":"Security Architecture for the Internet Protocol","author":"kent","year":"2005","journal-title":"RFC 4301"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/49.839934"},{"key":"ref14","article-title":"Secure Border Gateway Protocol (S-BGP) real world performance and deployment issues","author":"kent","year":"2000","journal-title":"NDSS"},{"key":"ref15","article-title":"HMAC: Keyed-Hashing for Message Authentication","author":"krawczyk","year":"0","journal-title":"RFC 2104"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/357172.357176"},{"key":"ref17","article-title":"Intermediate System to Intermediate System (IS-IS) Cryptographic Authentication","author":"li","year":"2003","journal-title":"RFC 2567"},{"key":"ref18","article-title":"OSPF Version 2","author":"moy","year":"1998","journal-title":"RFC 2328"},{"key":"ref19","article-title":"Hierarchical Routing and the Subnetwork Partition Problem","author":"perlman","year":"0","journal-title":"Fifteenth Hawaii international Conference on System Sciences"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.1997.646178"},{"key":"ref3","article-title":"RIP-2 MD5 Authentication","author":"baker","year":"1997","journal-title":"RFC 2082"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.11"},{"key":"ref5","article-title":"Domain name system security extensions","author":"eastlake","year":"1997","journal-title":"RFC 2065"},{"key":"ref8","article-title":"Protection of BGP Sessions via the TCP MD5 Signature Option","author":"heffernan","year":"1998","journal-title":"RFC 2385"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(98)00022-X"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/570681.570684"},{"key":"ref9","article-title":"Efficient Security Mechanisms for Routing Protocols","author":"hu","year":"0","journal-title":"NDSS 2003"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948133"},{"journal-title":"Interconnections Bridges Routers Switches and Internetworking Protocols","year":"1999","author":"perlman","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/49.105178"},{"key":"ref21","article-title":"Network Layer Protocols with Byzantine Robustness","author":"perlman","year":"1988","journal-title":"MIT LCS Tech Report 429"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1544012.1544036"},{"key":"ref23","article-title":"Securing BGP Through Secure Origin BGP (soBGP)","author":"white","year":"2003","journal-title":"The Internet Protocol Journal"}],"event":{"name":"2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011)","start":{"date-parts":[[2011,1,4]]},"location":"Bangalore","end":{"date-parts":[[2011,1,8]]}},"container-title":["2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5710820\/5716386\/05716503.pdf?arnumber=5716503","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T04:02:27Z","timestamp":1490068947000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5716503\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,1]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/comsnets.2011.5716503","relation":{},"subject":[],"published":{"date-parts":[[2011,1]]}}}