{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:46:10Z","timestamp":1772163970092,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2006,8,11]],"date-time":"2006-08-11T00:00:00Z","timestamp":1155254400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2006,8,11]]},"DOI":"10.1145\/1159913.1159946","type":"proceedings-article","created":{"date-parts":[[2006,10,18]],"date-time":"2006-10-18T18:04:00Z","timestamp":1161194640000},"page":"279-290","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["Modeling adoptability of secure BGP protocol"],"prefix":"10.1145","author":[{"given":"Haowen","family":"Chan","sequence":"first","affiliation":[{"name":"Carnegie Mellon University"}]},{"given":"Debabrata","family":"Dash","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University"}]},{"given":"Adrian","family":"Perrig","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University"}]},{"given":"Hui","family":"Zhang","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University"}]}],"member":"320","published-online":{"date-parts":[[2006,8,11]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948133"},{"key":"e_1_3_2_1_2_1","volume-title":"March","author":"D. Eastlake","year":"1999","unstructured":"D. Eastlake 3rd. Domain Name System Security Extensions. RFC 2535 (Proposed Standard) , March 1999 . D. Eastlake 3rd. Domain Name System Security Extensions. RFC 2535 (Proposed Standard), March 1999."},{"key":"e_1_3_2_1_3_1","volume-title":"Proceedings of symposium on Network and Distributed System Security (NDSS'03)","author":"Goodell G.","year":"2003","unstructured":"G. Goodell , W. Aiello , T. Griffin , J. Ioannidis , P. McDaniel , and A. Rubin . Working around BGP: An incremental approach to improving security and accuracy in interdomain routing . In Proceedings of symposium on Network and Distributed System Security (NDSS'03) , February 2003 . G. Goodell, W. Aiello, T. Griffin, J. Ioannidis, P. McDaniel, and A. Rubin. Working around BGP: An incremental approach to improving security and accuracy in interdomain routing. In Proceedings of symposium on Network and Distributed System Security (NDSS'03), February 2003."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1208984"},{"key":"e_1_3_2_1_5_1","unstructured":"http:\/\/www.routeviews.org\/.University of Oregon route views project.  http:\/\/www.routeviews.org\/.University of Oregon route views project."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1015467.1015488"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/956750.956769"},{"key":"e_1_3_2_1_8_1","first-page":"103","volume-title":"Symposium on Network and Distributed Systems Security (NDSS '00)","author":"Kent S.","year":"2000","unstructured":"S. Kent , C. Lynn , J. Mikkelson , and K. Seo . Secure border gateway protocol (S-BGP) -real world performance and deployment issues . In Symposium on Network and Distributed Systems Security (NDSS '00) , pages 103 -- 116 , San Diego, CA , February 2000 . S. Kent, C. Lynn, J. Mikkelson, and K. Seo. Secure border gateway protocol (S-BGP) -real world performance and deployment issues. In Symposium on Network and Distributed Systems Security (NDSS '00), pages 103--116, San Diego, CA, February 2000."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/49.839934"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45248-5_2"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/882459.882563"},{"key":"e_1_3_2_1_12_1","volume-title":"February","author":"Murphy S.","year":"2002","unstructured":"S. Murphy . BGP Security Vulnerabilities Analysis. IETF draft-ietf-idr-bgp-vuln-00 , February 2002 . S. Murphy. BGP Security Vulnerabilities Analysis. IETF draft-ietf-idr-bgp-vuln-00, February 2002."},{"key":"e_1_3_2_1_13_1","volume-title":"Proceedings of NANOG 19","author":"Norton William B.","year":"2000","unstructured":"William B. Norton . Internet service providers and peering . In Proceedings of NANOG 19 , Albuquerque, New Mexico , June 2000 . William B. Norton. Internet service providers and peering. In Proceedings of NANOG 19, Albuquerque, New Mexico, June 2000."},{"key":"e_1_3_2_1_14_1","volume-title":"Proc. of the First Symposium on Networked Systems Design and Implementation NSDI'04)","author":"Subramanian L.","year":"2004","unstructured":"L. Subramanian , V. Roth , I. Stoica , S. Shenker , and R. Katz . Listen and whisper: Security mechanisms for BGP . In Proc. of the First Symposium on Networked Systems Design and Implementation NSDI'04) , 2004 . L. Subramanian, V. Roth, I. Stoica, S. Shenker, and R. Katz. Listen and whisper: Security mechanisms for BGP. In Proc. of the First Symposium on Networked Systems Design and Implementation NSDI'04), 2004."},{"key":"e_1_3_2_1_15_1","volume-title":"Proc. of Internet Society Symposium on Network and Distributed System Security (NDSS'05)","author":"Wan T.","year":"2005","unstructured":"T. Wan , E. Kranakis , and P. van Oorschot . Pretty secure BGP (psBGP) . In Proc. of Internet Society Symposium on Network and Distributed System Security (NDSS'05) , 2005 . T. Wan, E. Kranakis, and P. van Oorschot. Pretty secure BGP (psBGP). In Proc. of Internet Society Symposium on Network and Distributed System Security (NDSS'05), 2005."},{"key":"e_1_3_2_1_16_1","volume-title":"Cisco Internet Protocol Journal","author":"White R.","year":"2003","unstructured":"R. White . Securing BGP through secure origin BGP. Technical report , Cisco Internet Protocol Journal , September 2003 . R. White. Securing BGP through secure origin BGP. Technical report, Cisco Internet Protocol Journal, September 2003."},{"key":"e_1_3_2_1_18_1","volume-title":"Workshop on Secure Network Protocols","author":"Yu Harlan","year":"2005","unstructured":"Harlan Yu , Jennifer Rexford , and Edward W. Felten . A distributed reputation approach to cooperative internet routing protection . In Workshop on Secure Network Protocols , 2005 . Harlan Yu, Jennifer Rexford, and Edward W. Felten. A distributed reputation approach to cooperative internet routing protection. In Workshop on Secure Network Protocols, 2005."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/1895868.1895900"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/781027.781053"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102139"},{"key":"e_1_3_2_1_22_1","volume-title":"IEEE DSN 2002","author":"Zhao X.","year":"2002","unstructured":"X. Zhao , D. Pei , L. Wang , D. Massey , A. Mankin , S. Wu , and L. Zhang . Detection of invalid routing announcements in the internet . In IEEE DSN 2002 , 2002 . X. Zhao, D. Pei, L. Wang, D. Massey, A. Mankin, S. Wu, and L. Zhang. Detection of invalid routing announcements in the internet. In IEEE DSN 2002, 2002."}],"event":{"name":"SIGCOMM06: ACM SIGCOMM 2006 Conference","location":"Pisa Italy","acronym":"SIGCOMM06","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication","ACM Association for Computing Machinery"]},"container-title":["Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1159913.1159946","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1159913.1159946","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T11:14:15Z","timestamp":1750245255000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1159913.1159946"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,8,11]]},"references-count":21,"alternative-id":["10.1145\/1159913.1159946","10.1145\/1159913"],"URL":"https:\/\/doi.org\/10.1145\/1159913.1159946","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/1151659.1159946","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2006,8,11]]},"assertion":[{"value":"2006-08-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}