{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T04:53:13Z","timestamp":1764996793460,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2006,3,21]],"date-time":"2006-03-21T00:00:00Z","timestamp":1142899200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2006,3,21]]},"DOI":"10.1145\/1128817.1128866","type":"proceedings-article","created":{"date-parts":[[2006,5,8]],"date-time":"2006-05-08T21:40:43Z","timestamp":1147124443000},"page":"321-331","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Identity-based registry for secure interdomain routing"],"prefix":"10.1145","author":[{"given":"E-yong","family":"Kim","sequence":"first","affiliation":[{"name":"Seoul National University, Seoul, Korea"}]},{"given":"Klara","family":"Nahrstedt","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, IL"}]},{"given":"Li","family":"Xiao","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, IL"}]},{"given":"Kunsoo","family":"Park","sequence":"additional","affiliation":[{"name":"Seoul National University, Seoul, Korea"}]}],"member":"320","published-online":{"date-parts":[[2006,3,21]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/11535218_13"},{"key":"e_1_3_2_1_2_1","volume-title":"Routing Policy Specification Language (RPSL). RFC","author":"Alaettinoglu C.","year":"1999","unstructured":"C. Alaettinoglu , C. Villamizar , E. Gerich , D. Kessens , D. Meyer , T. Bates , D. Karrenberg , and M. Terpstra . Routing Policy Specification Language (RPSL). RFC 2622, Jun 1999 .]] C. Alaettinoglu, C. Villamizar, E. Gerich, D. Kessens, D. Meyer, T. Bates, D. Karrenberg, and M. Terpstra. Routing Policy Specification Language (RPSL). RFC 2622, Jun 1999.]]"},{"key":"e_1_3_2_1_3_1","volume-title":"Representation of IP Routing Policies in a Routing Registry (ripe-81 ++). RFC","author":"Bates T.","year":"1995","unstructured":"T. Bates , E. Gerich , L. Joncheray , J.-M. Jouanigot , D. Karrenberg , M. Terpstra , and J. Yu . Representation of IP Routing Policies in a Routing Registry (ripe-81 ++). RFC 1786, Mar 1995 .]] T. Bates, E. Gerich, L. Joncheray, J.-M. Jouanigot, D. Karrenberg, M. Terpstra, and J. Yu. Representation of IP Routing Policies in a Routing Registry (ripe-81 ++). RFC 1786, Mar 1995.]]"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/168588.168596"},{"key":"e_1_3_2_1_6_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"506","DOI":"10.1007\/978-3-540-24676-3_30","volume-title":"Advances in Cryptology -- EUROCRYPT","author":"Boneh D.","year":"2004","unstructured":"D. Boneh , G. D. Crescenzo , R. Ostrovsky , and G. Persiano . Public-Key Encryption with keyword Search . In Advances in Cryptology -- EUROCRYPT 2004 , volume 3027 of Lecture Notes in Computer Science , pages 506 -- 522 . Springer--Verlag , 2004.]] D. Boneh, G. D. Crescenzo, R. Ostrovsky, and G. Persiano. Public-Key Encryption with keyword Search. In Advances in Cryptology -- EUROCRYPT 2004, volume 3027 of Lecture Notes in Computer Science, pages 506--522. Springer--Verlag, 2004.]]"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539701398521"},{"key":"e_1_3_2_1_8_1","unstructured":"V. J. Bono. 7007 Explanation and Apology. http:\/\/www.merit.edu\/mail.archives\/nanog\/1997-04\/msg00444.html.]]  V. J. Bono. 7007 Explanation and Apology. http:\/\/www.merit.edu\/mail.archives\/nanog\/1997-04\/msg00444.html.]]"},{"key":"e_1_3_2_1_9_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"383","DOI":"10.1007\/978-3-540-45146-4_23","volume-title":"Advances in Cryptology -- CRYPTO","author":"Boyen X.","year":"2003","unstructured":"X. Boyen . Multipurpose Identity-Based Signcryption: A Swiss Army Knife for Identity-Based Cryptography . In Advances in Cryptology -- CRYPTO 2003 , volume 2729 of Lecture Notes in Computer Science , pages 383 -- 399 . Springer--Verlag , 2003.]] X. Boyen. Multipurpose Identity-Based Signcryption: A Swiss Army Knife for Identity-Based Cryptography. In Advances in Cryptology -- CRYPTO 2003, volume 2729 of Lecture Notes in Computer Science, pages 383--399. Springer--Verlag, 2003.]]"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030104"},{"key":"e_1_3_2_1_13_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1007\/3-540-44598-6_14","volume-title":"Advances in Cryptology -- CRYPTO","author":"Coron J.-S.","year":"2000","unstructured":"J.-S. Coron . On the Exact Security of Full Domain Hash . In Advances in Cryptology -- CRYPTO 2000 , volume 1880 of Lecture Notes in Computer Science , pages 229 -- 235 . Springer--Verlag , 2000.]] J.-S. Coron. On the Exact Security of Full Domain Hash. In Advances in Cryptology -- CRYPTO 2000, volume 1880 of Lecture Notes in Computer Science, pages 229--235. Springer--Verlag, 2000.]]"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24852-1_3"},{"key":"e_1_3_2_1_16_1","volume-title":"Proceedings of the 10th Network and Distributed System Security Symposium (NDSS)","author":"Goodell G.","year":"2003","unstructured":"G. Goodell , W. Aiello , T. Griffin , J. Ioannidis , P. McDaniel , and A. Rubin . Working Around BGP: An Incremental Approach to Improving Security and Accuracy of Interdomain Routing . In Proceedings of the 10th Network and Distributed System Security Symposium (NDSS) , Feb 2003 .]] G. Goodell, W. Aiello, T. Griffin, J. Ioannidis, P. McDaniel, and A. Rubin. Working Around BGP: An Incremental Approach to Improving Security and Accuracy of Interdomain Routing. In Proceedings of the 10th Network and Distributed System Security Symposium (NDSS), Feb 2003.]]"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1015467.1015488"},{"key":"e_1_3_2_1_18_1","unstructured":"Internet Routing Registry. http:\/\/www.irr.net.]]  Internet Routing Registry. http:\/\/www.irr.net.]]"},{"key":"e_1_3_2_1_19_1","volume-title":"Proceedings of the 7th Network and Distributed System Security Symposium (NDSS)","author":"Kent S.","year":"2000","unstructured":"S. Kent , C. Lynn , J. Mikkelson , and K. Seo . Secure Border Gateway Protocol (S-BGP) -- Real World Performance and Deployment Issues . In Proceedings of the 7th Network and Distributed System Security Symposium (NDSS) , Feb 2000 .]] S. Kent, C. Lynn, J. Mikkelson, and K. Seo. Secure Border Gateway Protocol (S-BGP) -- Real World Performance and Deployment Issues. In Proceedings of the 7th Network and Distributed System Security Symposium (NDSS), Feb 2000.]]"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/49.839934"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45248-5_2"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/633025.633027"},{"key":"e_1_3_2_1_24_1","volume-title":"Oct","author":"Murphy S.","year":"2004","unstructured":"S. Murphy . BGP Security Vulnerabilities Analysis . IETF Internet Draft , Oct 2004 .]] S. Murphy. BGP Security Vulnerabilities Analysis. IETF Internet Draft, Oct 2004.]]"},{"key":"e_1_3_2_1_25_1","volume-title":"IETF Internet Draft","author":"Ng J.","year":"2004","unstructured":"J. Ng . Extensions to BGP to Support Secure Origin BGP (soBGP) . IETF Internet Draft , Apr 2004 . draft-ng-sobgp-bgp-extensions-02.txt.]] J. Ng. Extensions to BGP to Support Secure Origin BGP (soBGP). IETF Internet Draft, Apr 2004. draft-ng-sobgp-bgp-extensions-02.txt.]]"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/997150.997152"},{"key":"e_1_3_2_1_27_1","volume-title":"Proceedings of the 5th International Workshop on Information Security Applications (WISA)","volume":"3325","author":"Park D. J.","year":"2004","unstructured":"D. J. Park , K. Kim , and P. J. Lee . Public Key Encryption with Conjunctive Field Keyword Search . In Proceedings of the 5th International Workshop on Information Security Applications (WISA) , volume 3325 of Lecture Notes in Computer Science, pages 73--86. Springer--Verlag , 2004 .]] D. J. Park, K. Kim, and P. J. Lee. Public Key Encryption with Conjunctive Field Keyword Search. In Proceedings of the 5th International Workshop on Information Security Applications (WISA), volume 3325 of Lecture Notes in Computer Science, pages 73--86. Springer--Verlag, 2004.]]"},{"key":"e_1_3_2_1_28_1","first-page":"1771","volume":"4","author":"Rekhter Y.","year":"1995","unstructured":"Y. Rekhter and T. Li . A Border Gateway Protocol 4 (BGP-4). RFC 1771 , Mar 1995 .]] Y. Rekhter and T. Li. A Border Gateway Protocol 4 (BGP-4). RFC 1771, Mar 1995.]]","journal-title":"A Border Gateway Protocol"},{"key":"e_1_3_2_1_29_1","series-title":"Lecture Notes in Computer Science","first-page":"47","volume-title":"Advances in Cryptology -- CRYPTO '84","author":"Shamir A.","year":"1984","unstructured":"A. Shamir . Identity-Based Cryptosystems and Signature Schemes . In Advances in Cryptology -- CRYPTO '84 , volume 196 of Lecture Notes in Computer Science , pages 47 -- 53 . Springer--Verlag , 1984 .]] A. Shamir. Identity-Based Cryptosystems and Signature Schemes. In Advances in Cryptology -- CRYPTO '84, volume 196 of Lecture Notes in Computer Science, pages 47--53. Springer--Verlag, 1984.]]"},{"key":"e_1_3_2_1_30_1","first-page":"44","volume-title":"Proceedings of IEEE Symposium on Security and Privacy","author":"Song D. X.","year":"2000","unstructured":"D. X. Song , D. Wagner , and A. Perrig . Practical Techniques for Searches on Encrypted Data . In Proceedings of IEEE Symposium on Security and Privacy , pages 44 -- 55 , May 2000 .]] D. X. Song, D. Wagner, and A. Perrig. Practical Techniques for Searches on Encrypted Data. In Proceedings of IEEE Symposium on Security and Privacy, pages 44--55, May 2000.]]"},{"key":"e_1_3_2_1_31_1","unstructured":"Stanford Applied Crypto Group. IBE Secure E-mail. http:\/\/crypto.stanford.edu\/ibe\/.]]  Stanford Applied Crypto Group. IBE Secure E-mail. http:\/\/crypto.stanford.edu\/ibe\/.]]"},{"key":"e_1_3_2_1_32_1","volume-title":"Proceedings of First Symposium on Networked Systems Design and Implementation (NSDI)","author":"Subramanian L.","year":"2004","unstructured":"L. Subramanian , V. Roth , I. Stoica , S. Shenker , and R. H. Katz . Listen and Whisper: Security Mechanisms for BGP . In Proceedings of First Symposium on Networked Systems Design and Implementation (NSDI) , Mar 2004 .]] L. Subramanian, V. Roth, I. Stoica, S. Shenker, and R. H. Katz. Listen and Whisper: Security Mechanisms for BGP. In Proceedings of First Symposium on Networked Systems Design and Implementation (NSDI), Mar 2004.]]"},{"key":"e_1_3_2_1_33_1","volume-title":"Proceedings of the 12th Network and Distributed System Security Symposium (NDSS)","author":"Wan T.","year":"2005","unstructured":"T. Wan , E. Kranakis , and P. C. van Oorschot . Pretty Secure BGP (psBGP) . In Proceedings of the 12th Network and Distributed System Security Symposium (NDSS) , Feb 2005 .]] T. Wan, E. Kranakis, and P. C. van Oorschot. Pretty Secure BGP (psBGP). In Proceedings of the 12th Network and Distributed System Security Symposium (NDSS), Feb 2005.]]"},{"key":"e_1_3_2_1_34_1","first-page":"205","volume-title":"Proceedings of the 11th Network and Distributed System Security Symposium (NDSS)","author":"Waters B. R.","year":"2004","unstructured":"B. R. Waters , D. Balfanz , G. Durfee , and D. K. Smetters . Building an Encrypted and Searchable Audit Log . In Proceedings of the 11th Network and Distributed System Security Symposium (NDSS) , pages 205 -- 214 , Feb 2004 .]] B. R. Waters, D. Balfanz, G. Durfee, and D. K. Smetters. Building an Encrypted and Searchable Audit Log. In Proceedings of the 11th Network and Distributed System Security Symposium (NDSS), pages 205--214, Feb 2004.]]"},{"key":"e_1_3_2_1_35_1","volume-title":"Sep","author":"White R.","year":"2003","unstructured":"R. White . Securing BGP Through Secure Origin BGP. The Internet Protocol Journal, 6(3):15--22 , Sep 2003 .]] R. White. Securing BGP Through Secure Origin BGP. The Internet Protocol Journal, 6(3):15--22, Sep 2003.]]"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.5555\/647883.760856"}],"event":{"name":"Asia CCS06: ACM Symposium on Information, Computer and Communications Security 2006","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Taipei Taiwan","acronym":"Asia CCS06"},"container-title":["Proceedings of the 2006 ACM Symposium on Information, computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1128817.1128866","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1128817.1128866","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T15:06:17Z","timestamp":1750259177000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1128817.1128866"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,3,21]]},"references-count":31,"alternative-id":["10.1145\/1128817.1128866","10.1145\/1128817"],"URL":"https:\/\/doi.org\/10.1145\/1128817.1128866","relation":{},"subject":[],"published":{"date-parts":[[2006,3,21]]},"assertion":[{"value":"2006-03-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}