{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,21]],"date-time":"2025-11-21T18:11:05Z","timestamp":1763748665088,"version":"3.37.3"},"reference-count":40,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,5,2]],"date-time":"2022-05-02T00:00:00Z","timestamp":1651449600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,5,2]],"date-time":"2022-05-02T00:00:00Z","timestamp":1651449600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,5,2]]},"DOI":"10.1109\/infocom48880.2022.9796844","type":"proceedings-article","created":{"date-parts":[[2022,6,20]],"date-time":"2022-06-20T21:18:49Z","timestamp":1655759929000},"page":"21-30","source":"Crossref","is-referenced-by-count":5,"title":["The Hanging ROA: A Secure and Scalable Encoding Scheme for Route Origin Authorization"],"prefix":"10.1109","author":[{"given":"Yanbiao","family":"Li","sequence":"first","affiliation":[{"name":"Chinese Academy of Sciences,Computer Network Information Center,Beijing,China"}]},{"given":"Hui","family":"Zou","sequence":"additional","affiliation":[{"name":"Chinese Academy of Sciences,Computer Network Information Center,Beijing,China"}]},{"given":"Yuxuan","family":"Chen","sequence":"additional","affiliation":[{"name":"Chinese Academy of Sciences,Computer Network Information Center,Beijing,China"}]},{"given":"Yinbo","family":"Xu","sequence":"additional","affiliation":[{"name":"Chinese Academy of Sciences,Computer Network Information Center,Beijing,China"}]},{"given":"Zhuoran","family":"Ma","sequence":"additional","affiliation":[{"name":"Chinese Academy of Sciences,Computer Network Information Center,Beijing,China"}]},{"given":"Di","family":"Ma","sequence":"additional","affiliation":[{"name":"Internet Domain Name System Beijing Engineering Research Center (ZDNS),Beijing,China"}]},{"given":"Ying","family":"Hu","sequence":"additional","affiliation":[{"name":"Chinese Academy of Sciences,Computer Network Information Center,Beijing,China"}]},{"given":"Gaogang","family":"Xie","sequence":"additional","affiliation":[{"name":"Chinese Academy of Sciences,Computer Network Information Center,Beijing,China"}]}],"member":"263","reference":[{"key":"ref39","first-page":"654","article-title":"On the classification and false alarm of invalid prefixes in RPKI based BGP route origin validation","author":"xu","year":"2019","journal-title":"2017 IFIP\/IEEE Symposium on Integrated Network and Service Management (IM) IM"},{"doi-asserted-by":"publisher","key":"ref38","DOI":"10.1145\/2834050.2834102"},{"year":"0","journal-title":"University of Oregon Route Views Project","key":"ref33"},{"key":"ref32","article-title":"Problem Statement and Considerations for ROAs issued with Multiple Prefixes","author":"yan","year":"2021","journal-title":"Internet-Draft draft-yan-sidrops-roa-considerations-06 Internet Engineering Task Force"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1145\/367390.367400"},{"key":"ref30","article-title":"The Use of Maxlength in the RPKI","author":"gilad","year":"2021","journal-title":"Internet-Draft draft-ietf-sidrops-rpkimaxlen-06 Internet Engineering Task Force"},{"doi-asserted-by":"publisher","key":"ref37","DOI":"10.1145\/3211852.3211856"},{"doi-asserted-by":"publisher","key":"ref36","DOI":"10.1145\/2934872.2934883"},{"doi-asserted-by":"publisher","key":"ref35","DOI":"10.1145\/2834050.2834078"},{"year":"0","journal-title":"Routing information service (RIS)","key":"ref34"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.17487\/RFC8182"},{"doi-asserted-by":"publisher","key":"ref40","DOI":"10.14722\/ndss.2020.24355"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.17487\/rfc6810"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.17487\/RFC8206"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.17487\/RFC8374"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/MNET.2018.1800171"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/INFOCOMWKSHPS51825.2021.9484629"},{"key":"ref16","article-title":"A Profile for Autonomous System Provider Authorization. Internet-Draft draft-azimov-sidrops-aspa-profile-01","author":"azimov","year":"2019","journal-title":"Internet Engineering Task Force"},{"key":"ref17","article-title":"Verification of AS PATH Using the Resource Certificate Public Key Infrastructure and Autonomous System Provider Authorization","author":"azimov","year":"2018","journal-title":"Internet-Draft draft-azimov-sidrops-aspa-verification-01 Internet Engineering Task Force"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.17487\/rfc6482"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.17487\/rfc6483"},{"key":"ref28","article-title":"Are we there yet? on rpki&#x2019;s deployment and security","author":"gilad","year":"2017","journal-title":"NDSS"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/TNET.2018.2869798"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1145\/3355369.3355596"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/SECCOM.2007.4550358"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.17487\/RFC8210"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1145\/3143361.3143363"},{"year":"2012","author":"lepinski","journal-title":"An Infrastructure to Support Secure Internet Routing","key":"ref5"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1145\/2740070.2631435"},{"year":"0","journal-title":"NIST RPKI monitor","key":"ref7"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.17487\/rfc4271"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1007\/978-3-030-29959-0_6"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.17487\/rfc1105"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.17487\/rfc6811"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1145\/2377677.2377702"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.17487\/rfc7115"},{"key":"ref24","first-page":"1120005","article-title":"Sizing estimates for a fully deployed rpki","author":"osterweil","year":"2012","journal-title":"Verisign Labs TR"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1007\/978-3-030-44081-7_5","article-title":"To filter or not to filter: Measuring the benefits of registering in the rpki today","volume":"12048","author":"clark","year":"2020","journal-title":"Passive and Active Measurement 21st International Conference PAM 2020 Eugene Oregon USA March 30-31 2020 Proceedings"},{"key":"ref26","article-title":"Study and measurements of the rpki deployment","author":"iamartino","year":"2015","journal-title":"Master&#x2019;s thesis"},{"year":"0","journal-title":"BGP Analysis Reports","key":"ref25"}],"event":{"name":"IEEE INFOCOM 2022 - IEEE Conference on Computer Communications","start":{"date-parts":[[2022,5,2]]},"location":"London, United Kingdom","end":{"date-parts":[[2022,5,5]]}},"container-title":["IEEE INFOCOM 2022 - IEEE Conference on Computer Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9796607\/9796652\/09796844.pdf?arnumber=9796844","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T20:46:48Z","timestamp":1658177208000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9796844\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,2]]},"references-count":40,"URL":"https:\/\/doi.org\/10.1109\/infocom48880.2022.9796844","relation":{},"subject":[],"published":{"date-parts":[[2022,5,2]]}}}