{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,18]],"date-time":"2025-01-18T05:28:41Z","timestamp":1737178121652,"version":"3.33.0"},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,6]]},"DOI":"10.1109\/iwqos.2007.376562","type":"proceedings-article","created":{"date-parts":[[2007,6,28]],"date-time":"2007-06-28T19:56:49Z","timestamp":1183060609000},"page":"154-163","source":"Crossref","is-referenced-by-count":3,"title":["Securing BGP through Keychain-based Signatures"],"prefix":"10.1109","author":[{"given":"Heng","family":"Yin","sequence":"first","affiliation":[]},{"given":"Bo","family":"Sheng","sequence":"additional","affiliation":[]},{"given":"Haining","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jianping","family":"Pan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","article-title":"Generating strong one-way functions with cryptographic algorithm","author":"matyas","year":"1985","journal-title":"IBM Technical Disclosure Bulletin"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/49.839934"},{"key":"18","article-title":"Secure BGP (S-BGP)","author":"lynn","year":"2003","journal-title":"Internet Engineering Task Force Draft"},{"key":"15","article-title":"Securing the Boder Gateway Protocol: A status update","author":"kent","year":"2003","journal-title":"Seventh IFIP TC-6 TC-11 Conference on Communications and Multimedia Security"},{"key":"16","article-title":"Secure Boder Gateway Protocol (S-BGP) - real world performance and deployment issues","author":"kent","year":"2000","journal-title":"Proceedings of Network and Distributed System Security Symposium (NDSS 2000)"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2006.320179"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2401"},{"journal-title":"In Proceedings of the 5th Workshop on Hot Topics in Networks (HotNets-V)","year":"2006","author":"hu","key":"11"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/1015467.1015488"},{"key":"21","article-title":"BGP security vulnerabilitis analysis","author":"murphy","year":"2004","journal-title":"Internet Engineering Task Force Draft"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/SP.1980.10006"},{"key":"22","article-title":"Application of the Border Gateway Protocol in the Internet","author":"rekhter","year":"1995","journal-title":"Request for Comments 1772 Internet Engineering Task Force"},{"key":"23","article-title":"A Border Gateway Protocol 4 (BGP-4)","author":"rekhter","year":"1995","journal-title":"Request for Comments 1771 Internet Engineering Task Force"},{"key":"24","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-45450-0_11","article-title":"Better than BiBa: Short one-time signatures with fast signing and verifying","author":"reyzin","year":"2002","journal-title":"Proc 7th Australasian Conf Information Security and Privacy (ACISP 2002)"},{"key":"25","article-title":"Listen and whisper: Security mechanisms for BGP","author":"subramanian","year":"2004","journal-title":"Proc First Symp Networked Systems Design and Implementation (NSDI '04)"},{"key":"26","article-title":"Pretty secure BGP (psBGP)","author":"wan","year":"2004","journal-title":"Proc Network and Distributed System Security Symp (NDSS 2001)"},{"key":"27","article-title":"Deployment considerations for Secure Origin BGP(soBGP)","author":"white","year":"2003","journal-title":"Internet Engineering Task Force Draft"},{"key":"28","doi-asserted-by":"crossref","DOI":"10.1145\/1179509","article-title":"Identity-based registry for secure inter-domain routing","author":"yong kim","year":"2006","journal-title":"Proc of the 2006 ACM Symp on Information Computer and Comm Security"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102139"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948133"},{"year":"0","key":"2"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2385"},{"year":"0","key":"1","article-title":"BGP reports"},{"key":"7","article-title":"An attack tree for the Border Gateway Protocol","author":"convery","year":"2004","journal-title":"Internet Engineering Task Force Draft"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/511399.511380"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180442"},{"key":"4","article-title":"Generic threats to routing protocols","author":"barbir","year":"2004","journal-title":"Internet Engineering Task Force Draft"},{"key":"9","article-title":"Working around BGP: An incremental approach to improving security and accuracy in interdomain routing","author":"goodell","year":"2003","journal-title":"Proc Network and Distributed System Security Symp (NDSS 2001)"},{"journal-title":"AES proposal Rijndael","year":"1999","author":"daemen","key":"8"}],"event":{"name":"2007 Fifteenth IEEE International Workshop on Quality of Service","start":{"date-parts":[[2007,6,21]]},"location":"Evanston, IL, USA","end":{"date-parts":[[2007,6,22]]}},"container-title":["2007 Fifteenth IEEE International Workshop on Quality of Service"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4262439\/4262440\/04262466.pdf?arnumber=4262466","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,17]],"date-time":"2025-01-17T23:37:18Z","timestamp":1737157038000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4262466\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,6]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/iwqos.2007.376562","relation":{},"ISSN":["1548-615X"],"issn-type":[{"type":"print","value":"1548-615X"}],"subject":[],"published":{"date-parts":[[2007,6]]}}}