{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T00:02:32Z","timestamp":1729641752127,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,7]]},"DOI":"10.1109\/icccn.2012.6289235","type":"proceedings-article","created":{"date-parts":[[2012,9,7]],"date-time":"2012-09-07T19:57:53Z","timestamp":1347047873000},"page":"1-9","source":"Crossref","is-referenced-by-count":1,"title":["Relieve Internet Routing Security of Public Key Infrastructure"],"prefix":"10.1109","author":[{"given":"Luigi V.","family":"Mancini","sequence":"first","affiliation":[]},{"given":"Angelo","family":"Spognardi","sequence":"additional","affiliation":[]},{"given":"Claudio","family":"Soriente","sequence":"additional","affiliation":[]},{"given":"Antonio","family":"Villani","sequence":"additional","affiliation":[]},{"given":"Domenico","family":"Vitali","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"257","article-title":"Identity-based aggregate signatures","author":"gentry","year":"2006","journal-title":"Public Key Cryptography (PKC)"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102139"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2011.19"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/1851182.1851195"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/1232919.1232923"},{"key":"13","article-title":"Securing BGP Through Secure Origin BGP","volume":"6","author":"white","year":"2003","journal-title":"The Internet Protocol Journal"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/1266977.1266980"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/1281100.1281123"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2009.2034031"},{"journal-title":"Scalable Simulation Framework - Network Models","year":"1999","key":"21"},{"key":"20","doi-asserted-by":"crossref","first-page":"276","DOI":"10.1145\/1315245.1315280","article-title":"Ordered multisignatures and identity-based sequential aggregate signatures, with applications to secure routing","author":"boldyreva","year":"2007","journal-title":"CCS '07"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-001-0009-4"},{"journal-title":"Route Views Project","year":"0","key":"23"},{"journal-title":"The pairing-based cryptography library","year":"2006","key":"24"},{"journal-title":"The Open Source toolkit for SSL\/TLS","year":"1998","key":"25"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2001.992760"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/5992.743621"},{"key":"28","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1145\/347057.347428","article-title":"Delayed internet routing convergence","author":"labovitz","year":"0","journal-title":"Proc ACM SIGCOMM 2000"},{"key":"29","first-page":"131","article-title":"Bgp route flap damping","volume":"9","author":"villamizar","year":"1998","journal-title":"IEEE International Conference on Performance Computing and Communications 2004"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/1282427.1282411"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/633026.633027"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1402989"},{"key":"1","article-title":"BGP4: Inter-domain routing in the Internet","author":"stewart","year":"1999","journal-title":"The Addison-Wesley Networking Basics Series"},{"key":"30","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1145\/316194.316229","article-title":"On power-law relationships of the internet topology","volume":"29","author":"faloutsos","year":"1999","journal-title":"SIGCOMM Comput Commun Rev"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2010.101008"},{"key":"6","article-title":"Sequential aggregate signatures with lazy verification for s-bgp","volume":"2011","author":"brogle","year":"2011","journal-title":"ePrint Technical Report"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/49.839934"},{"journal-title":"YouTube Hijacking A RIPE NCC RIS Case Study","year":"2008","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/1966913.1966927"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/1030194.1015488"}],"event":{"name":"2012 21st International Conference on Computer Communications and Networks - ICCCN 2012","start":{"date-parts":[[2012,7,30]]},"location":"Munich, Germany","end":{"date-parts":[[2012,8,2]]}},"container-title":["2012 21st International Conference on Computer Communications and Networks (ICCCN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6287204\/6289167\/06289235.pdf?arnumber=6289235","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T23:54:26Z","timestamp":1498002866000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6289235\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,7]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/icccn.2012.6289235","relation":{},"subject":[],"published":{"date-parts":[[2012,7]]}}}