{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T17:40:35Z","timestamp":1738777235377,"version":"3.37.0"},"reference-count":10,"publisher":"Academy Publisher","issue":"6","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JNW"],"DOI":"10.4304\/jnw.9.6.1447-1453","type":"journal-article","created":{"date-parts":[[2014,6,10]],"date-time":"2014-06-10T02:59:48Z","timestamp":1402369188000},"source":"Crossref","is-referenced-by-count":0,"title":["A Scheme for Securing Traffic Transport among Autonomous Systems"],"prefix":"10.4304","volume":"9","author":[{"given":"Bo","family":"Yang","sequence":"first","affiliation":[]}],"member":"2838","published-online":{"date-parts":[[2014,6,9]]},"reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.041010.00041"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.3724\/SP.J.1001.2013.04346"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2009.2034031"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/49.839934"},{"key":"ref5","first-page":"103","article-title":"Towards Detecting BGP Route Hijacking using the RPKI","volume-title":"Proceeding of ACM Special Interest Group on Data Communication (SIGCOMM)","author":"Wahlisch","year":"2012","unstructured":"[9] Matthias Wahlisch, Olaf Maennel, Thomas C. Schmidt, Towards Detecting BGP Route Hijacking using the RPKI, Proceeding of ACM Special Interest Group on Data Communication (SIGCOMM), Helsinki Finland, pp. 103-104, August 2012."},{"key":"ref6","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1145\/1015467.1015488","article-title":"SPV: Secure path vector routing for securing BGP","volume-title":"Proc of the ACM SIGCOMM","author":"Hu","year":"2004","unstructured":"[10] Yih-Chun Hu, Adrian Perrig, and Marvin Sirbu, SPV: Secure path vector routing for securing BGP, in Proc. of the ACM SIGCOMM, Yavatkar, Washington, 2004, pp. 179-192."},{"issue":"2","key":"ref7","first-page":"357","article-title":"A Method for Securing the Announcements and Withdrawals of Inter-domain Routes.","volume":"33","author":"Yang","year":"2012","unstructured":"[14] Bo Yang. A Method for Securing the Announcements and Withdrawals of Inter-domain Routes. Journal of Chinese Computer Systems, 2012, 33(2): 357-364 (in Chinese)","journal-title":"Journal of Chinese Computer Systems"},{"issue":"12","key":"ref8","first-page":"2424","article-title":"A Certificate-less Mechanism for Preventing IP Prefix Hijacks among Autonomous Systems.","volume":"32","author":"Le","year":"2011","unstructured":"[15] Zhongjian Le, Bo Yang. A Certificate-less Mechanism for Preventing IP Prefix Hijacks among Autonomous Systems. Journal of Chinese Computer Systems, 2011, 32(12): 2424-2429 (in Chinese)","journal-title":"Journal of Chinese Computer Systems"},{"key":"ref9","first-page":"28","article-title":"How secure are secure interdomain routing protocols.","volume-title":"Proceeding of ACM Special Interest Group on Data Communication (SIGCOMM)","author":"Goldberg","year":"2010","unstructured":"[16] S. Goldberg, M. Schapira, P. Hummon, J. Rexford. How secure are secure interdomain routing protocols. Proceeding of ACM Special Interest Group on Data Communication (SIGCOMM), New Delhi India, August 2010, pp. 28-39."},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1266977.1266980"}],"container-title":["Journal of Networks"],"original-title":[],"deposited":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T17:06:27Z","timestamp":1738775187000},"score":1,"resource":{"primary":{"URL":"https:\/\/dblp.org\/db\/journals\/jnw\/index.html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6,9]]},"references-count":10,"journal-issue":{"issue":"6","published-online":{"date-parts":[[2014,6,9]]}},"URL":"https:\/\/doi.org\/10.4304\/jnw.9.6.1447-1453","relation":{},"ISSN":["1796-2056"],"issn-type":[{"type":"print","value":"1796-2056"}],"subject":[],"published":{"date-parts":[[2014,6,9]]}}}