{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T13:34:54Z","timestamp":1767706494301,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":71,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,12,6]],"date-time":"2011-12-06T00:00:00Z","timestamp":1323129600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1.04E+48"],"award-info":[{"award-number":["1.04E+48"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000181","name":"Air Force Office of Scientific Research","doi-asserted-by":"publisher","award":["FA9550-10-1-0073"],"award-info":[{"award-number":["FA9550-10-1-0073"]}],"id":[{"id":"10.13039\/100000181","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000006","name":"Office of Naval Research","doi-asserted-by":"publisher","award":["N00014-09-10757"],"award-info":[{"award-number":["N00014-09-10757"]}],"id":[{"id":"10.13039\/100000006","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,12,6]]},"DOI":"10.1145\/2079296.2079326","type":"proceedings-article","created":{"date-parts":[[2011,12,20]],"date-time":"2011-12-20T17:47:13Z","timestamp":1324403233000},"page":"1-12","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":107,"title":["Verifying and enforcing network paths with icing"],"prefix":"10.1145","author":[{"given":"Jad","family":"Naous","sequence":"first","affiliation":[{"name":"MIT"}]},{"given":"Michael","family":"Walfish","sequence":"additional","affiliation":[{"name":"UT Austin"}]},{"given":"Antonio","family":"Nicolosi","sequence":"additional","affiliation":[{"name":"Stevens Institute of Technology"}]},{"given":"David","family":"Mazi\u00e8res","sequence":"additional","affiliation":[{"name":"Stanford"}]},{"given":"Michael","family":"Miller","sequence":"additional","affiliation":[{"name":"UT Austin"}]},{"given":"Arun","family":"Seehra","sequence":"additional","affiliation":[{"name":"UT Austin"}]}],"member":"320","published-online":{"date-parts":[[2011,12,6]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"The 32-bit autonomous system number report. http:\/\/www.potaroo.net\/tools\/asn32\/index.html.  The 32-bit autonomous system number report. http:\/\/www.potaroo.net\/tools\/asn32\/index.html."},{"key":"e_1_3_2_1_2_1","unstructured":"NetFPGA: Programmable networking hardware. http:\/\/netfpga.org.  NetFPGA: Programmable networking hardware. http:\/\/netfpga.org."},{"key":"e_1_3_2_1_3_1","unstructured":"Packet traces from wide backbone. http:\/\/mawi.wide.ad.jp\/mawi\/samplepoint-F\/2011\/201101231400.html.  Packet traces from wide backbone. http:\/\/mawi.wide.ad.jp\/mawi\/samplepoint-F\/2011\/201101231400.html."},{"key":"e_1_3_2_1_4_1","unstructured":"Sync SRAMs overview. http:\/\/www.cypress.com\/?id=95.  Sync SRAMs overview. http:\/\/www.cypress.com\/?id=95."},{"key":"e_1_3_2_1_5_1","unstructured":"Digital signature standard (DSS). Federal Information Processing Standards Publication November 2008. DRAFT FIPS PUB 186--3.  Digital signature standard (DSS). Federal Information Processing Standards Publication November 2008. DRAFT FIPS PUB 186--3."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948133"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1402997"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1016707.1016718"},{"volume-title":"HotNets","year":"2005","author":"Argyraki K.","key":"e_1_3_2_1_9_1"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2004.1354494"},{"volume-title":"Proc of the INET Conference","year":"1995","author":"Aziz A.","key":"e_1_3_2_1_11_1"},{"key":"e_1_3_2_1_12_1","unstructured":"H. Ballani Y. Chawathe S. Ratnasamy T. Roscoe and S. Shenker. Off by default! In HotNets Nov. 2005.  H. Ballani Y. Chawathe S. Ratnasamy T. Roscoe and S. Shenker. Off by default! In HotNets Nov. 2005."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/1788414.1788434"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/90.649568"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/647087.715843"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2009.2034031"},{"volume-title":"NSDI","year":"2005","author":"Caesar M.","key":"e_1_3_2_1_17_1"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/BROADNETS.2007.4550434"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1282380.1282382"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/FCCM.2009.29"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251375.1251396"},{"volume-title":"NSDI","year":"2008","author":"Dixon C.","key":"e_1_3_2_1_22_1"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629578"},{"issue":"4","key":"e_1_3_2_1_24_1","article-title":"VISA protocols for controlling inter-organizational datagram flow","volume":"7","author":"Estrin D.","year":"1989","journal-title":"IEEE JSAC"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"A. Farrel A. Ayyangar and J. Vasseur. Inter-domain MPLS and GMPLS traffic engineering -- resource reservation protocol-traffic engineering (RSVP-TE) extensions. RFC 5151 Feb. 2008.  A. Farrel A. Ayyangar and J. Vasseur. Inter-domain MPLS and GMPLS traffic engineering -- resource reservation protocol-traffic engineering (RSVP-TE) extensions. RFC 5151 Feb. 2008.","DOI":"10.17487\/rfc5151"},{"key":"e_1_3_2_1_26_1","unstructured":"N. G. Feamster. Proactive Techniques for Correct and Predictable Internet Routing. PhD thesis M. I. T. Sept. 2005.   N. G. Feamster. Proactive Techniques for Correct and Predictable Internet Routing . PhD thesis M. I. T. Sept. 2005."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"P. Ferguson and D. Senie. Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing. RFC 2827 May 2000.   P. Ferguson and D. Senie. Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing. RFC 2827 May 2000.","DOI":"10.17487\/rfc2827"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1592568.1592583"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1375457.1375480"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1096536.1096541"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1384609.1384625"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1282380.1282403"},{"volume-title":"OSDI","year":"2004","author":"Gummadi K. P.","key":"e_1_3_2_1_33_1"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1016707.1016717"},{"key":"e_1_3_2_1_35_1","unstructured":"P. Hawkes and C. McDonald. Submission to the SHA-3 competition: The CHI family of cryptographic hash algorithms. Submission to NIST 2008. http:\/\/ehash.iaik.tugraz.at\/uploads\/2\/2c\/Chi_submission.pdf.  P. Hawkes and C. McDonald. Submission to the SHA-3 competition: The CHI family of cryptographic hash algorithms. Submission to NIST 2008. http:\/\/ehash.iaik.tugraz.at\/uploads\/2\/2c\/Chi_submission.pdf."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.1"},{"volume-title":"NDSS","year":"2003","author":"Hu Y.-C.","key":"e_1_3_2_1_37_1"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1015467.1015488"},{"key":"e_1_3_2_1_39_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"155","DOI":"10.1007\/978-3-540-79263-5_10","volume-title":"Topics in Cryptology -- CT-RSA","author":"Katz J.","year":"2008"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/49.839934"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/633025.633032"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/354871.354874"},{"volume-title":"USENIX SECURITY","year":"2006","author":"Lad M.","key":"e_1_3_2_1_43_1"},{"volume-title":"NSDI","year":"2011","author":"Li A.","key":"e_1_3_2_1_44_1"},{"volume-title":"NSDI","year":"2008","author":"Liu X.","key":"e_1_3_2_1_45_1"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1402981"},{"volume-title":"NSDI","year":"2007","author":"Mahajan R.","key":"e_1_3_2_1_47_1"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/863955.863996"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/319151.319160"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"crossref","unstructured":"R. Moskowitz and P. Nikander. Host identity protocol (HIP) architecture. RFC 4423 May 2006.  R. Moskowitz and P. Nikander. Host identity protocol (HIP) architecture. RFC 4423 May 2006.","DOI":"10.17487\/rfc4423"},{"key":"e_1_3_2_1_52_1","unstructured":"J. Naous. Path-policy Compliant Networking and a Platform for Heterogeneous IAAS Management. PhD thesis Mar. 2011.  J. Naous. Path-policy Compliant Networking and a Platform for Heterogeneous IAAS Management . PhD thesis Mar. 2011."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/774763.774775"},{"volume-title":"Massachusetts Institute of Technology","year":"1988","author":"Perlman R.","key":"e_1_3_2_1_54_1"},{"volume-title":"OSDI","year":"2010","author":"Popa L.","key":"e_1_3_2_1_55_1"},{"key":"e_1_3_2_1_56_1","unstructured":"Prolexic Technologies Inc. http:\/\/www.prolexic.com.  Prolexic Technologies Inc. http:\/\/www.prolexic.com."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/1015467.1015487"},{"volume-title":"Network Working Group","year":"2001","author":"Rosen E.","key":"e_1_3_2_1_58_1"},{"key":"e_1_3_2_1_59_1","unstructured":"RouteScience PathControl. http:\/\/www.networkworld.com\/reviews\/2002\/0415rev.html.  RouteScience PathControl. http:\/\/www.networkworld.com\/reviews\/2002\/0415rev.html."},{"key":"e_1_3_2_1_60_1","unstructured":"M. Scott. Miracl library. https:\/\/www.shamus.ie\/index.php?page=Downloads.  M. Scott. Miracl library. https:\/\/www.shamus.ie\/index.php?page=Downloads."},{"volume-title":"HotNets","year":"2009","author":"Seehra A.","key":"e_1_3_2_1_61_1"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/633025.633033"},{"volume-title":"OSDI","year":"2004","author":"Walfish M.","key":"e_1_3_2_1_63_1"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/1159913.1159934"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2004.1301320"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2006.877138"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2007.893888"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/1159913.1159933"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2007.914506"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.45"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/1544012.1544036"},{"key":"e_1_3_2_1_72_1","unstructured":"E. Zmijewski. You can't get there from here. http:\/\/www.renesys.com\/blog\/2008\/03\/you-cant-get-there-from-here-1.shtml Mar. 2008.  E. Zmijewski. You can't get there from here. http:\/\/www.renesys.com\/blog\/2008\/03\/you-cant-get-there-from-here-1.shtml Mar. 2008."}],"event":{"name":"Co-NEXT '11: Conference on emerging Networking Experiments and Technologies","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"],"location":"Tokyo Japan","acronym":"Co-NEXT '11"},"container-title":["Proceedings of the Seventh COnference on emerging Networking EXperiments and Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2079296.2079326","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2079296.2079326","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:06:17Z","timestamp":1750241177000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2079296.2079326"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,12,6]]},"references-count":71,"alternative-id":["10.1145\/2079296.2079326","10.1145\/2079296"],"URL":"https:\/\/doi.org\/10.1145\/2079296.2079326","relation":{},"subject":[],"published":{"date-parts":[[2011,12,6]]},"assertion":[{"value":"2011-12-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}