{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:45:16Z","timestamp":1772163916194,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":56,"publisher":"ACM","license":[{"start":{"date-parts":[[2004,8,30]],"date-time":"2004-08-30T00:00:00Z","timestamp":1093824000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2004,8,30]]},"DOI":"10.1145\/1015467.1015488","type":"proceedings-article","created":{"date-parts":[[2004,10,7]],"date-time":"2004-10-07T13:39:48Z","timestamp":1097156388000},"page":"179-192","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":94,"title":["SPV"],"prefix":"10.1145","author":[{"given":"Yih-Chun","family":"Hu","sequence":"first","affiliation":[{"name":"UC Berkeley"}]},{"given":"Adrian","family":"Perrig","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University"}]},{"given":"Marvin","family":"Sirbu","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University"}]}],"member":"320","published-online":{"date-parts":[[2004,8,30]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC2082"},{"key":"e_1_3_2_1_2_1","volume-title":"April","author":"Barbir A.","year":"2004","unstructured":"A. Barbir , S. Murphy , and Y. Yang . Generic Threats to Routing Protocols. Internet-Draft draft-ietf-rpsec-routing-threats-06 , April 2004 .]] A. Barbir, S. Murphy, and Y. Yang. Generic Threats to Routing Protocols. Internet-Draft draft-ietf-rpsec-routing-threats-06, April 2004.]]"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/795663.796360"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/378444.378449"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/646767.704310"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1007\/3-540-44647-8_13","volume-title":"Advances in Cryptology -- CRYPTO '2001","author":"Boneh D.","year":"2001","unstructured":"D. Boneh and M. Franklin . Identity-Based Encryption from the Weil Pairing . In Advances in Cryptology -- CRYPTO '2001 , pages 213 -- 229 , 2001 .]] D. Boneh and M. Franklin. Identity-Based Encryption from the Weil Pairing. In Advances in Cryptology -- CRYPTO '2001, pages 213--229, 2001.]]"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1998.674828"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/285237.285258"},{"key":"e_1_3_2_1_9_1","first-page":"90","volume-title":"An Efficient Message Authentication Scheme for Link State Routing. In 13th Annual Computer Security Applications Conference","author":"Cheung S.","year":"1997","unstructured":"S. Cheung . An Efficient Message Authentication Scheme for Link State Routing. In 13th Annual Computer Security Applications Conference , pages 90 -- 98 , 1997 .]] S. Cheung. An Efficient Message Authentication Scheme for Link State Routing. In 13th Annual Computer Security Applications Conference, pages 90--98, 1997.]]"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/283699.283744"},{"key":"e_1_3_2_1_11_1","volume-title":"February","author":"Convery S.","year":"2004","unstructured":"S. Convery , D. Cook , and M. Franz . An Attack Tree for the Border Gateway Protocol. Internet-Draft draft-ietf-rpsec-bgpattack-00 , February 2004 .]] S. Convery, D. Cook, and M. Franz. An Attack Tree for the Border Gateway Protocol. Internet-Draft draft-ietf-rpsec-bgpattack-00, February 2004.]]"},{"key":"e_1_3_2_1_12_1","first-page":"29","volume-title":"Proceedings of the 11th USENIX Security Symposium","author":"Crosby S.","year":"2003","unstructured":"S. Crosby and D. Wallach . Denial of Service via Algorithmic Complexity Attacks . In Proceedings of the 11th USENIX Security Symposium , pages 29 -- 44 , August 2003 .]] S. Crosby and D. Wallach. Denial of Service via Algorithmic Complexity Attacks. In Proceedings of the 11th USENIX Security Symposium, pages 29--44, August 2003.]]"},{"key":"e_1_3_2_1_13_1","volume-title":"August","author":"Security","year":"1999","unstructured":"Security of E-commerce threatened by 512-bit number factorization. http:\/\/www.cwi.nl\/~kik\/persb-UK.html , August 1999 . CWI press release.]] Security of E-commerce threatened by 512-bit number factorization. http:\/\/www.cwi.nl\/~kik\/persb-UK.html, August 1999. CWI press release.]]"},{"key":"e_1_3_2_1_14_1","volume-title":"March","author":"Daemen J.","year":"1999","unstructured":"J. Daemen and V. Rijmen . AES Proposal: Rijndael , March 1999 .]] J. Daemen and V. Rijmen. AES Proposal: Rijndael, March 1999.]]"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/503048.503055"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","first-page":"263","DOI":"10.1007\/0-387-34805-0_24","volume-title":"Advances in Cryptology -- CRYPTO '89","author":"Even S.","year":"1990","unstructured":"S. Even , O. Goldreich , and S. Micali . On-line\/off-line digital signatures . In Advances in Cryptology -- CRYPTO '89 , pages 263 -- 277 , 1990 .]] S. Even, O. Goldreich, and S. Micali. On-line\/off-line digital signatures. In Advances in Cryptology -- CRYPTO '89, pages 263--277, 1990.]]"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/6490.6503"},{"key":"e_1_3_2_1_19_1","volume-title":"Proceedings of NDSS 2003","author":"Goodell G.","year":"2003","unstructured":"G. Goodell , W. Aiello , T. Griffin , J. Ioannidis , P. McDaniel , and A. Rubin . Working around BGP: An Incremental Approach to Improving Security and Accuracy in Interdomain Routing . In Proceedings of NDSS 2003 , February 2003 .]] G. Goodell, W. Aiello, T. Griffin, J. Ioannidis, P. McDaniel, and A. Rubin. Working around BGP: An Incremental Approach to Improving Security and Accuracy in Interdomain Routing. In Proceedings of NDSS 2003, February 2003.]]"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/523975.830482"},{"key":"e_1_3_2_1_21_1","volume-title":"Protection of BGP Sessions via the TCP MD5 Signature Option. RFC","author":"Heffernan A.","year":"1998","unstructured":"A. Heffernan . Protection of BGP Sessions via the TCP MD5 Signature Option. RFC 2385, August 1998 .]] A. Heffernan. Protection of BGP Sessions via the TCP MD5 Signature Option. RFC 2385, August 1998.]]"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1570-8705(03)00019-2"},{"key":"e_1_3_2_1_23_1","volume-title":"Proceedings of NDSS 2003","author":"Hu Y.-C.","year":"2003","unstructured":"Y.-C. Hu , A. Perrig , and D. B. Johnson . Efficient Security Mechanisms for Routing Protocols . In Proceedings of NDSS 2003 , February 2003 .]] Y.-C. Hu, A. Perrig, and D. B. Johnson. Efficient Security Mechanisms for Routing Protocols. In Proceedings of NDSS 2003, February 2003.]]"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1209219"},{"key":"e_1_3_2_1_25_1","volume-title":"Internet Engineering Task Force","author":"Kent S.","year":"1998","unstructured":"S. Kent and R. Atkinson . IP Encapsulating Security Payload (ESP). Internet Request for Comment RFC 2406 , Internet Engineering Task Force , November 1998 .]] S. Kent and R. Atkinson. IP Encapsulating Security Payload (ESP). Internet Request for Comment RFC 2406, Internet Engineering Task Force, November 1998.]]"},{"key":"e_1_3_2_1_26_1","volume-title":"Internet Engineering Task Force","author":"Kent S.","year":"1998","unstructured":"S. Kent and R. Atkinson . Security Architecture for the Internet Protocol. Internet Request for Comment RFC 2401 , Internet Engineering Task Force , November 1998 .]] S. Kent and R. Atkinson. Security Architecture for the Internet Protocol. Internet Request for Comment RFC 2401, Internet Engineering Task Force, November 1998.]]"},{"key":"e_1_3_2_1_27_1","first-page":"103","volume-title":"Proceedings of NDSS 2000","author":"Kent S.","year":"2000","unstructured":"S. Kent , C. Lynn , J. Mikkelson , and K. Seo . Secure Border Gateway Protocol (S-BGP) -- Real World Performance and Deployment Issues . In Proceedings of NDSS 2000 , pages 103 -- 116 , February 2000 .]] S. Kent, C. Lynn, J. Mikkelson, and K. Seo. Secure Border Gateway Protocol (S-BGP) -- Real World Performance and Deployment Issues. In Proceedings of NDSS 2000, pages 103--116, February 2000.]]"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/49.839934"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45248-5_2"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/153949.153953"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/165611.165615"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-001-0009-4"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/633025.633027"},{"key":"e_1_3_2_1_35_1","volume-title":"Internet Engineering Task Force","author":"Malkin G.","year":"1998","unstructured":"G. Malkin . RIP Version 2. Internet Request for Comment RFC 2453 , Internet Engineering Task Force , November 1998 .]] G. Malkin. RIP Version 2. Internet Request for Comment RFC 2453, Internet Engineering Task Force, November 1998.]]"},{"key":"e_1_3_2_1_36_1","first-page":"5658","volume":"27","author":"Matyas S.","year":"1985","unstructured":"S. Matyas , C. Meyer , and J. Oseas . Generating Strong One-Way Functions with Cryptographic Algorithm. IBM Technical Disclosure Bulletin , 27 : 5658 -- 5659 , 1985 .]] S. Matyas, C. Meyer, and J. Oseas. Generating Strong One-Way Functions with Cryptographic Algorithm. IBM Technical Disclosure Bulletin, 27:5658--5659, 1985.]]","journal-title":"Generating Strong One-Way Functions with Cryptographic Algorithm. IBM Technical Disclosure Bulletin"},{"key":"e_1_3_2_1_37_1","volume-title":"Handbook of Applied Cryptography","author":"Menezes A. J.","year":"1997","unstructured":"A. J. Menezes , P. C. van Oorschot , and S. A. Vanstone . Handbook of Applied Cryptography . CRC Press Series on Discrete Mathematics and its Applications. CRC Press , 1997 .]] A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone. Handbook of Applied Cryptography. CRC Press Series on Discrete Mathematics and its Applications. CRC Press, 1997.]]"},{"key":"e_1_3_2_1_38_1","volume-title":"Protocols for Public Key Cryptosystems. In 1980 IEEE Symposium on Security and Privacy","author":"Merkle R.","year":"1980","unstructured":"R. Merkle . Protocols for Public Key Cryptosystems. In 1980 IEEE Symposium on Security and Privacy , 1980 .]] R. Merkle. Protocols for Public Key Cryptosystems. In 1980 IEEE Symposium on Security and Privacy, 1980.]]"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"crossref","first-page":"369","DOI":"10.1007\/3-540-48184-2_32","volume-title":"Advances in Cryptology -- CRYPTO '87","author":"Merkle R.","year":"1988","unstructured":"R. Merkle . A Digital Signature Based on a Conventional Encryption Function . In Advances in Cryptology -- CRYPTO '87 , pages 369 -- 378 , 1988 .]] R. Merkle. A Digital Signature Based on a Conventional Encryption Function. In Advances in Cryptology -- CRYPTO '87, pages 369--378, 1988.]]"},{"key":"e_1_3_2_1_40_1","unstructured":"D. Meyer. Route Views Project Page. http:\/\/www.routeviews.org.]]  D. Meyer. Route Views Project Page. http:\/\/www.routeviews.org.]]"},{"key":"e_1_3_2_1_41_1","volume-title":"http:\/\/www.merit.edu\/mail.archives\/nanog\/1997-04\/msg00340. html","author":"Misel S. A.","year":"1997","unstructured":"S. A. Misel . Wow, AS7007! NANOG mail archives , http:\/\/www.merit.edu\/mail.archives\/nanog\/1997-04\/msg00340. html , 1997 .]] S. A. Misel. Wow, AS7007! NANOG mail archives, http:\/\/www.merit.edu\/mail.archives\/nanog\/1997-04\/msg00340. html, 1997.]]"},{"key":"e_1_3_2_1_42_1","volume-title":"October","author":"Murphy S.","year":"2002","unstructured":"S. Murphy . BGP Security Protections. Internet-Draft draft-murphy-bgp-protect-01 , October 2002 .]] S. Murphy. BGP Security Protections. Internet-Draft draft-murphy-bgp-protect-01, October 2002.]]"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/997150.997152"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2004.1276605"},{"key":"e_1_3_2_1_45_1","volume-title":"Bridges and Routers","author":"Perlman R.","year":"1992","unstructured":"R. Perlman . Interconnections : Bridges and Routers . Addison-Wesley , 1992 .]] R. Perlman. Interconnections: Bridges and Routers. Addison-Wesley, 1992.]]"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"crossref","DOI":"10.17487\/rfc1771","volume-title":"A Border Gateway Protocol 4 (BGP-4). RFC","author":"Rekhter Y.","year":"1995","unstructured":"Y. Rekhter and T. Li . A Border Gateway Protocol 4 (BGP-4). RFC 1771, March 1995 .]] Y. Rekhter and T. Li. A Border Gateway Protocol 4 (BGP-4). RFC 1771, March 1995.]]"},{"key":"e_1_3_2_1_47_1","volume-title":"Information Security and Privacy -- 7th Australasian Conference (ACSIP","author":"Reyzin L.","year":"2002","unstructured":"L. Reyzin and N. Reyzin . Better than Biba: Short One-Time Signatures with Fast Signing and Verifying . In Information Security and Privacy -- 7th Australasian Conference (ACSIP 2002 ), July 2002.]] L. Reyzin and N. Reyzin. Better than Biba: Short One-Time Signatures with Fast Signing and Verifying. In Information Security and Privacy -- 7th Australasian Conference (ACSIP 2002), July 2002.]]"},{"key":"e_1_3_2_1_48_1","volume-title":"The MD5 Message-Digest Algorithm. RFC","author":"Rivest R. L.","year":"1992","unstructured":"R. L. Rivest . The MD5 Message-Digest Algorithm. RFC 1321, April 1992 .]] R. L. Rivest. The MD5 Message-Digest Algorithm. RFC 1321, April 1992.]]"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/319709.319722"},{"key":"e_1_3_2_1_51_1","unstructured":"Routing Protocol Security Requirements (rpsec). IETF working group http:\/\/www.ietf.org\/html.charters\/rpsec-charter.html 2004.]]  Routing Protocol Security Requirements (rpsec). IETF working group http:\/\/www.ietf.org\/html.charters\/rpsec-charter.html 2004.]]"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.1996.586129"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.5555\/523975.830483"},{"key":"e_1_3_2_1_54_1","volume-title":"inter-domain routing in the Internet","author":"Stewart J. W.","year":"1999","unstructured":"J. W. Stewart . BGP4 : inter-domain routing in the Internet . Addison-Wesley , 1999 .]] J. W. Stewart. BGP4: inter-domain routing in the Internet. Addison-Wesley, 1999.]]"},{"key":"e_1_3_2_1_55_1","volume-title":"Proceedings of First Symposium on Networked Systems Design and Implementation (NSDI 2004)","author":"Subramanian L.","year":"2004","unstructured":"L. Subramanian , V. Roth , I. Stoica , S. Shenker , and R. Katz . Listen and Whisper: Security Mechanisms for BGP . In Proceedings of First Symposium on Networked Systems Design and Implementation (NSDI 2004) , March 2004 .]] L. Subramanian, V. Roth, I. Stoica, S. Shenker, and R. Katz. Listen and Whisper: Security Mechanisms for BGP. In Proceedings of First Symposium on Networked Systems Design and Implementation (NSDI 2004), March 2004.]]"},{"key":"e_1_3_2_1_57_1","volume-title":"Internet Engineering Task Force","author":"White R.","year":"2003","unstructured":"R. White . Deployment Considerations for Secure Origin BGP (soBGP), draft-white-sobgp-bgp-deployment-01.txt. Draft , Internet Engineering Task Force , June 2003 . Available at http:\/\/www.watersprings.org\/pub\/id\/draft-white-sobgp-bgp-deployment-01.txt.]] R. White. Deployment Considerations for Secure Origin BGP (soBGP), draft-white-sobgp-bgp-deployment-01.txt. Draft, Internet Engineering Task Force, June 2003. Available at http:\/\/www.watersprings.org\/pub\/id\/draft-white-sobgp-bgp-deployment-01.txt.]]"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2004.1301320"},{"key":"e_1_3_2_1_59_1","volume-title":"Proceedings of NDSS '98","author":"Zhang K.","year":"1998","unstructured":"K. Zhang . Efficient Protocols for Signing Routing Messages . In Proceedings of NDSS '98 , March 1998 .]] K. Zhang. Efficient Protocols for Signing Routing Messages. In Proceedings of NDSS '98, March 1998.]]"}],"event":{"name":"SIGCOMM04: ACM SIGCOMM 2004 Conference","location":"Portland Oregon USA","acronym":"SIGCOMM04","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication","ACM Association for Computing Machinery"]},"container-title":["Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1015467.1015488","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1015467.1015488","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:23:45Z","timestamp":1750253025000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1015467.1015488"}},"subtitle":["secure path vector routing for securing BGP"],"short-title":[],"issued":{"date-parts":[[2004,8,30]]},"references-count":56,"alternative-id":["10.1145\/1015467.1015488","10.1145\/1015467"],"URL":"https:\/\/doi.org\/10.1145\/1015467.1015488","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/1030194.1015488","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2004,8,30]]},"assertion":[{"value":"2004-08-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}