{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,10]],"date-time":"2025-05-10T02:50:11Z","timestamp":1746845411818,"version":"3.28.0"},"reference-count":40,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T00:00:00Z","timestamp":1625097600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T00:00:00Z","timestamp":1625097600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T00:00:00Z","timestamp":1625097600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,7]]},"DOI":"10.1109\/icccn52240.2021.9522235","type":"proceedings-article","created":{"date-parts":[[2021,8,31]],"date-time":"2021-08-31T16:31:47Z","timestamp":1630427507000},"page":"1-9","source":"Crossref","is-referenced-by-count":2,"title":["Pervasive Internet-Wide Low-Latency Authentication"],"prefix":"10.1109","author":[{"given":"Cyrill","family":"Krahenbuhl","sequence":"first","affiliation":[]},{"given":"Markus","family":"Legner","sequence":"additional","affiliation":[]},{"given":"Silvan","family":"Bitterli","sequence":"additional","affiliation":[]},{"given":"Adrian","family":"Perrig","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"2015","author":"w\u00e4hlisch","journal-title":"RiPKI The tragic story of RPKI deployment in the web ecosystem","key":"ref39"},{"key":"ref38","article-title":"Perspectives: Improving SSH-style host authentication with multi-path probing","author":"wendlandt","year":"2008","journal-title":"Proceedings of the USENIX Annual Technical Conference"},{"key":"ref33","article-title":"Modelling and Automatically Analysing Privacy Properties for Honest-but-Curious Adversaries","author":"paverd","year":"2014","journal-title":"Tech Rep"},{"year":"2021","journal-title":"RPKI Monitor","key":"ref32"},{"year":"2013","author":"macaskill","journal-title":"GCHQ tapsfibre-optic cables for secret access to world&#x2019;s communications","key":"ref31"},{"key":"ref30","article-title":"X.509 Extensions for IP Addresses and ASI dentifiers","author":"lynn","year":"2004","journal-title":"RFC 3779"},{"doi-asserted-by":"publisher","key":"ref37","DOI":"10.17487\/RFC8738"},{"doi-asserted-by":"publisher","key":"ref36","DOI":"10.1145\/3320269.3384743"},{"doi-asserted-by":"publisher","key":"ref35","DOI":"10.17487\/RFC8446"},{"doi-asserted-by":"publisher","key":"ref34","DOI":"10.1007\/978-3-319-67080-5"},{"year":"2013","author":"cowie","journal-title":"The new threat Targeted internet traffic misdirection","key":"ref10"},{"doi-asserted-by":"publisher","key":"ref40","DOI":"10.17487\/rfc4251"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.17487\/rfc6891"},{"key":"ref12","article-title":"An empirical study of textual key-fingerprint representations","author":"dechand","year":"2016","journal-title":"USENIX Security Symposium"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.17487\/rfc2931"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.17487\/RFC7873"},{"year":"2015","author":"eijdenberg","journal-title":"Verifiable data structures","key":"ref15"},{"year":"0","author":"gieben","journal-title":"DNS library in Go","key":"ref16"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1007\/978-3-642-40203-6_15"},{"year":"0","journal-title":"Go cryptography","key":"ref18"},{"key":"ref19","article-title":"Do users verify SSH keys?","volume":"36","author":"gutmann","year":"2011","journal-title":"login"},{"key":"ref28","article-title":"Who is answering my queries: Understanding and characterizing interception of the DNS resolution path","author":"liu","year":"2018","journal-title":"USENIX Security Symposium"},{"year":"2021","author":"bates","journal-title":"Cidr report","key":"ref4"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.17487\/rfc6480"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.17487\/RFC8555"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1145\/3355369.3355596"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1145\/1923641.1923654"},{"key":"ref5","article-title":"The case for ubiquitous transport-level encryption","author":"bittau","year":"2010","journal-title":"USENIX Security Symposium"},{"year":"0","journal-title":"Cloudflare RPKI validator tools and libraries","key":"ref8"},{"key":"ref7","article-title":"A Longitudinal, End-to-End View of the DNSSEC Ecosystem","author":"chung","year":"2017","journal-title":"USENIX Security Symposium"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.17487\/rfc6394"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1145\/3243734.3243791"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1109\/ISCC.2009.5202224"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.17487\/RFC8110"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.17487\/RFC8773"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.17487\/rfc6698"},{"year":"0","journal-title":"Let&#x2019;s Encrypt","key":"ref24"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.17487\/rfc6487"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.17487\/rfc6962"},{"year":"0","journal-title":"Glider labs SSH","key":"ref25"}],"event":{"name":"2021 International Conference on Computer Communications and Networks (ICCCN)","start":{"date-parts":[[2021,7,19]]},"location":"Athens, Greece","end":{"date-parts":[[2021,7,22]]}},"container-title":["2021 International Conference on Computer Communications and Networks (ICCCN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9521949\/9522143\/09522235.pdf?arnumber=9522235","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T11:45:14Z","timestamp":1652183114000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9522235\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7]]},"references-count":40,"URL":"https:\/\/doi.org\/10.1109\/icccn52240.2021.9522235","relation":{},"subject":[],"published":{"date-parts":[[2021,7]]}}}