{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T03:24:15Z","timestamp":1725506655945},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,8]]},"DOI":"10.1109\/icccn.2009.5235308","type":"proceedings-article","created":{"date-parts":[[2009,9,11]],"date-time":"2009-09-11T15:26:15Z","timestamp":1252682775000},"page":"1-8","source":"Crossref","is-referenced-by-count":1,"title":["Certified Internet Coordinates"],"prefix":"10.1109","author":[{"given":"Mohamed Ali","family":"Kaafar","sequence":"first","affiliation":[]},{"given":"Laurent","family":"Mathy","sequence":"additional","affiliation":[]},{"given":"Chadi","family":"Barakat","sequence":"additional","affiliation":[]},{"given":"Kave","family":"Salamatian","sequence":"additional","affiliation":[]},{"given":"Thierry","family":"Turletti","sequence":"additional","affiliation":[]},{"given":"Walid","family":"Dabbous","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/1330107.1330122"},{"journal-title":"Proc of SIGCOMM Internet Measurement Workshop","year":"2002","key":"16"},{"key":"13","first-page":"976","author":"shorack","year":"1986","journal-title":"Empirical Processes with Applications to Statistics"},{"key":"14","article-title":"internet routing policies and round-trip times","author":"zheng","year":"2005","journal-title":"Proc of PAM"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1021\/ac00050a018"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/505202.505228"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/1015467.1015471"},{"key":"2","article-title":"a network positioning system for the internet","author":"ng","year":"2004","journal-title":"Proc of USENIX"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2004.1281582"},{"key":"10","article-title":"network coordinates in the wild","author":"ledlie","year":"2007","journal-title":"Proc of NSDI"},{"key":"7","article-title":"towards application-aware anonymous routing","author":"sherr","year":"2007","journal-title":"Proc Hot Topics in Security (HotSec)"},{"key":"6","article-title":"veracity: a fully decentralized service for securing network coordinate systems","author":"sherr","year":"2008","journal-title":"Proc of IPTPS"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/1452520.1452537"},{"key":"4","doi-asserted-by":"crossref","DOI":"10.1145\/1282427.1282388","article-title":"securing internet coordi nates embedding systems","author":"kaafar","year":"2007","journal-title":"Proc of SIGCOMM"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.306"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2004.1357017"}],"event":{"name":"2009 Proceedings of 18th International Conference on Computer Communications and Networks - ICCCN 2009","start":{"date-parts":[[2009,8,3]]},"location":"San Francisco, CA, USA","end":{"date-parts":[[2009,8,6]]}},"container-title":["2009 Proceedings of 18th International Conference on Computer Communications and Networks"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5235208\/5235209\/05235308.pdf?arnumber=5235308","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T19:38:54Z","timestamp":1497814734000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5235308\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,8]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/icccn.2009.5235308","relation":{},"subject":[],"published":{"date-parts":[[2009,8]]}}}