{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:26:45Z","timestamp":1750307205656,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,11,14]],"date-time":"2011-11-14T00:00:00Z","timestamp":1321228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["IIS-0812270CCF-0820208CNS-1040672CNS-1054229CNS-1065130"],"award-info":[{"award-number":["IIS-0812270CCF-0820208CNS-1040672CNS-1054229CNS-1065130"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000143","name":"Division of Computing and Communication Foundations","doi-asserted-by":"publisher","award":["IIS-0812270CCF-0820208CNS-1040672CNS-1054229CNS-1065130"],"award-info":[{"award-number":["IIS-0812270CCF-0820208CNS-1040672CNS-1054229CNS-1065130"]}],"id":[{"id":"10.13039\/100000143","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000181","name":"Air Force Office of Scientific Research","doi-asserted-by":"publisher","award":["FA9550-08-1-0352"],"award-info":[{"award-number":["FA9550-08-1-0352"]}],"id":[{"id":"10.13039\/100000181","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000145","name":"Division of Information and Intelligent Systems","doi-asserted-by":"publisher","award":["IIS-0812270CCF-0820208CNS-1040672CNS-1054229CNS-1065130"],"award-info":[{"award-number":["IIS-0812270CCF-0820208CNS-1040672CNS-1054229CNS-1065130"]}],"id":[{"id":"10.13039\/100000145","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,11,14]]},"DOI":"10.1145\/2070562.2070577","type":"proceedings-article","created":{"date-parts":[[2011,11,21]],"date-time":"2011-11-21T19:55:03Z","timestamp":1321905303000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["Having your cake and eating it too"],"prefix":"10.1145","author":[{"given":"Alexander J. T.","family":"Gurney","sequence":"first","affiliation":[{"name":"University of Pennsylvania"}]},{"given":"Andreas","family":"Haeberlen","sequence":"additional","affiliation":[{"name":"University of Pennsylvania"}]},{"given":"Wenchao","family":"Zhou","sequence":"additional","affiliation":[{"name":"University of Pennsylvania"}]},{"given":"Micah","family":"Sherr","sequence":"additional","affiliation":[{"name":"Georgetown University"}]},{"given":"Boon Thau","family":"Loo","sequence":"additional","affiliation":[{"name":"University of Pennsylvania"}]}],"member":"320","published-online":{"date-parts":[[2011,11,14]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1921168.1921170"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455804"},{"key":"e_1_3_2_1_3_1","volume-title":"Proc. YACC","author":"Bresson E.","year":"2006","unstructured":"E. Bresson , D. Catalano , N. Fazio , A. Nicolosi , and M. Yung . Output privacy in secure multiparty computation . In Proc. YACC , 2006 . E. Bresson, D. Catalano, N. Fazio, A. Nicolosi, and M. Yung. Output privacy in secure multiparty computation. In Proc. YACC, 2006."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1989284.1989305"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1198255.1198259"},{"key":"e_1_3_2_1_6_1","volume-title":"Proc. TPRC","author":"Faratin P.","year":"2007","unstructured":"P. Faratin , D. Clark , P. Gilmore , S. Bauer , A. Berger , and W. Lehr . Complexity of internet interconnections: Technology, incentives and implications for policy . In Proc. TPRC , 2007 . P. Faratin, D. Clark, P. Gilmore, S. Bauer, A. Berger, and W. Lehr. Complexity of internet interconnections: Technology, incentives and implications for policy. In Proc. TPRC, 2007."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/90.974527"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1402989"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/28395.28420"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/116825.116852"},{"key":"e_1_3_2_1_11_1","volume-title":"Proc. NSDI","author":"Haeberlen A.","year":"2009","unstructured":"A. Haeberlen , I. Avramopoulos , J. Rexford , and P. Druschel . NetReview: Detecting when interdomain routing goes wrong . In Proc. NSDI , Apr 2009 . A. Haeberlen, I. Avramopoulos, J. Rexford, and P. Druschel. NetReview: Detecting when interdomain routing goes wrong. In Proc. NSDI, Apr 2009."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/1833515.1833581"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/49.839934"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72540-4_4"},{"key":"e_1_3_2_1_15_1","volume-title":"Proc. NSDI","author":"Madhyastha H. V.","year":"2009","unstructured":"H. V. Madhyastha , E. Katz-Bassett , T. Anderson , A. Krishnamurthy , and A. Venkataramani . iPlane Nano: path prediction for peer-to-peer applications . In Proc. NSDI , 2009 . H. V. Madhyastha, E. Katz-Bassett, T. Anderson, A. Krishnamurthy, and A. Venkataramani. iPlane Nano: path prediction for peer-to-peer applications. In Proc. NSDI, 2009."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/633025.633027"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.1980.10006"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/997150.997152"},{"key":"e_1_3_2_1_19_1","volume-title":"Peering Dragnet: anti-social behavior amongst peers, and what you can do about it","author":"Patrick N.","year":"2006","unstructured":"N. Patrick , T. Scholl , A. Shaikh , and R. Steenbergen . Peering Dragnet: anti-social behavior amongst peers, and what you can do about it , 2006 . NANOG 38: http:\/\/nanog.org\/meetings\/nanog38\/presentations\/scholl-peering-dragnet.pdf. N. Patrick, T. Scholl, A. Shaikh, and R. Steenbergen. Peering Dragnet: anti-social behavior amongst peers, and what you can do about it, 2006. NANOG 38: http:\/\/nanog.org\/meetings\/nanog38\/presentations\/scholl-peering-dragnet.pdf."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/647097.717015"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2011.111006"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1402993"},{"key":"e_1_3_2_1_23_1","volume-title":"Proc. NSDI","author":"Wu J.","year":"2005","unstructured":"J. Wu , Z. M. Mao , J. Rexford , and J. Wang . Finding a needle in a haystack: Pinpointing significant BGP routing changes in an IP network . In Proc. NSDI , May 2005 . J. Wu, Z. M. Mao, J. Rexford, and J. Wang. Finding a needle in a haystack: Pinpointing significant BGP routing changes in an IP network. In Proc. NSDI, May 2005."},{"volume-title":"BGP Workshop","author":"Yoshinobu M.","key":"e_1_3_2_1_24_1","unstructured":"M. Yoshinobu . What makes our policy messy . BGP Workshop April 2009: http:\/\/www.attn.jp\/maz\/p\/c\/bgpworkshop200904\/. M. Yoshinobu. What makes our policy messy. BGP Workshop April 2009: http:\/\/www.attn.jp\/maz\/p\/c\/bgpworkshop200904\/."}],"event":{"name":"HOTNETS-X: Tenth ACM Workshop on Hot Topics in Networks","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication","CISCO"],"location":"Cambridge Massachusetts","acronym":"HOTNETS-X"},"container-title":["Proceedings of the 10th ACM Workshop on Hot Topics in Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2070562.2070577","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2070562.2070577","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:06:25Z","timestamp":1750241185000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2070562.2070577"}},"subtitle":["routing security with privacy protections"],"short-title":[],"issued":{"date-parts":[[2011,11,14]]},"references-count":24,"alternative-id":["10.1145\/2070562.2070577","10.1145\/2070562"],"URL":"https:\/\/doi.org\/10.1145\/2070562.2070577","relation":{},"subject":[],"published":{"date-parts":[[2011,11,14]]},"assertion":[{"value":"2011-11-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}