{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T21:10:45Z","timestamp":1730236245350,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,2]]},"DOI":"10.1109\/iccnc.2015.7069510","type":"proceedings-article","created":{"date-parts":[[2015,6,2]],"date-time":"2015-06-02T13:40:57Z","timestamp":1433252457000},"page":"1137-1141","source":"Crossref","is-referenced-by-count":2,"title":["A security-enhanced routing algorithm with path randomization"],"prefix":"10.1109","author":[{"given":"Mario","family":"Pagan","sequence":"first","affiliation":[]},{"given":"Audrey","family":"Hession","sequence":"additional","affiliation":[]},{"given":"Shengli","family":"Yuan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"OSPF with Digital Signatures","author":"murphy","year":"1996","journal-title":"Network Working Group"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SCORED.2007.4451370"},{"key":"ref12","article-title":"Spread: Improving Network Security by Multipath Routing","author":"lou","year":"0","journal-title":"IEEE Xplore"},{"key":"ref13","article-title":"Dijkstra's Algorithm Revisited: The Dynamic Programming Connexion (Vol. 35 No. 3)","author":"sniedovich","year":"1972","journal-title":"Control and Cybernetics"},{"key":"ref14","article-title":"Generic Threats to Routing Protocols","author":"barbir","year":"2004","journal-title":"Network Working Group"},{"key":"ref15","article-title":"Adaptive VPN: Tradeoff between Security Levels and Value-added Services in Virtual Private Networks","volume":"8","author":"sampath","year":"2004","journal-title":"IEEE Xplore Bell Labs Technical Journal"},{"key":"ref16","article-title":"Dynamic Routing with Security Considerations","author":"kuo","year":"2009","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"journal-title":"Algorithmic Solutions Software GmbH","year":"0","key":"ref17"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICNDS.2009.50"},{"article-title":"OSPF Version 2","year":"0","author":"moy","key":"ref3"},{"key":"ref6","article-title":"Dijkstra's Shortest Path Algorithm Serial and Parallel Execution Performance Analysis","author":"jasika","year":"0","journal-title":"IEEE Xplore"},{"key":"ref5","article-title":"A Multipath Routing Approach for Secure Data Delivery","author":"lou","year":"0","journal-title":"IEEE Xplore"},{"journal-title":"Secure Sockets Layer (SSL)","year":"2008","key":"ref8"},{"key":"ref7","article-title":"Experience with the BGP-4 Protocol","author":"mcpherson","year":"2014","journal-title":"RFC 4277 - Experience with the BGP-4 Protocol The Internet Society"},{"key":"ref2","article-title":"An Experimental Study of Insider Attacks for OSPF Routing Protocol","author":"brain","year":"0","journal-title":"IEEE Xplore Secure and Highly Available Network Group N d Web"},{"journal-title":"Communicating Over the Network","year":"2008","author":"rick","key":"ref1"},{"key":"ref9","article-title":"IP Security Document Roadmap","author":"thayer","year":"1998","journal-title":"Request for Comments (RFC 2411)"}],"event":{"name":"2015 International Conference on Computing, Networking and Communications (ICNC)","start":{"date-parts":[[2015,2,16]]},"location":"Garden Grove, CA, USA","end":{"date-parts":[[2015,2,19]]}},"container-title":["2015 International Conference on Computing, Networking and Communications (ICNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7057023\/7069279\/07069510.pdf?arnumber=7069510","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T20:41:19Z","timestamp":1490388079000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7069510\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,2]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/iccnc.2015.7069510","relation":{},"subject":[],"published":{"date-parts":[[2015,2]]}}}