{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T11:56:41Z","timestamp":1774353401889,"version":"3.50.1"},"reference-count":36,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,6]]},"DOI":"10.1109\/iwqos.2018.8624169","type":"proceedings-article","created":{"date-parts":[[2019,2,28]],"date-time":"2019-02-28T22:26:02Z","timestamp":1551392762000},"page":"1-10","source":"Crossref","is-referenced-by-count":35,"title":["Enabling Efficient Source and Path Verification via Probabilistic Packet Marking"],"prefix":"10.1109","author":[{"given":"Bo","family":"Wu","sequence":"first","affiliation":[]},{"given":"Ke","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Qi","family":"Li","sequence":"additional","affiliation":[]},{"given":"Zhuotao","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Yih-Chun","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Martin J.","family":"Reed","sequence":"additional","affiliation":[]},{"given":"Meng","family":"Shen","sequence":"additional","affiliation":[]},{"given":"Fan","family":"Yang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","article-title":"Working around bgp: An incremental approach to improving security and accuracy in interdomain routing","author":"geoffrey","year":"2003","journal-title":"NDSS"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2774451"},{"key":"ref31","author":"tirumala","year":"2005","journal-title":"Iperf The TCP\/UDP Bandwidth Measurement Tool"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/319151.319166"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.27"},{"key":"ref35","article-title":"Efficient security mechanisms for routing protocolsa","author":"hu","year":"2003","journal-title":"NDSS"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948133"},{"key":"ref10","first-page":"47","article-title":"Securing bgp through secure origin bgp (sobgp)","volume":"33","author":"white","year":"2003","journal-title":"Business Communications Review"},{"key":"ref11","article-title":"High-speed interdomain fault localization","author":"basescu","year":"2016","journal-title":"IEEE S&P"},{"key":"ref12","author":"bellovin","year":"2003","journal-title":"Using link cuts to attack Internet routing"},{"key":"ref13","article-title":"Persistent ospf attacks","author":"nakibly","year":"2012","journal-title":"NDSS"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/PCCC.2017.8280428"},{"key":"ref15","article-title":"Source authentication and path validation with orthogonal network capabilities","author":"ai","year":"2015","journal-title":"IEEE INFOCOM WKSHPS"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/90.929847"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2003.1199330"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2006.877138"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1015467.1015488"},{"key":"ref28","author":"whiting","year":"2003","journal-title":"Counter with CBC-MAC (CCM)"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2013.13"},{"key":"ref27","author":"sedgewick","year":"1988","journal-title":"Algorithms"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2079296.2079326"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2013.6678929"},{"key":"ref29","article-title":"Sha-3 proposal blake","author":"aumasson","year":"2008","journal-title":"NIST"},{"key":"ref5","article-title":"Passport: Secure and adoptable source authentication","author":"liu","year":"2008","journal-title":"USENIX NSDI"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2015.2458581"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2999572.2999605"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2619239.2626323"},{"key":"ref9","article-title":"Middlepo1ice: Toward enforcing destination-defined policies in the middle of the internet","author":"liu","year":"2016","journal-title":"ACM CCS"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/49.839934"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.21236\/ADA579930"},{"key":"ref22","article-title":"Shortmac: Efficient data-plane fault localization","author":"zhang","year":"2012","journal-title":"NDSS"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1592568.1592583"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.04.008"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2018.2815442"},{"key":"ref26","article-title":"Distance metrics in the internet","author":"bradley","year":"2002","journal-title":"IEEE International Telecommunications Symposium (ITS) Proceedings"},{"key":"ref25","year":"0","journal-title":"As path lengths"}],"event":{"name":"2018 IEEE\/ACM 26th International Symposium on Quality of Service (IWQoS)","location":"Banff, AB, Canada","start":{"date-parts":[[2018,6,4]]},"end":{"date-parts":[[2018,6,6]]}},"container-title":["2018 IEEE\/ACM 26th International Symposium on Quality of Service (IWQoS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8613196\/8624116\/08624169.pdf?arnumber=8624169","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,24]],"date-time":"2020-08-24T06:17:22Z","timestamp":1598249842000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8624169\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1109\/iwqos.2018.8624169","relation":{},"subject":[],"published":{"date-parts":[[2018,6]]}}}