[sBGP] | S. Kent, C. Lynn, and K. Seo. Secure border gateway protocol (S-BGP). IEEE Journal on Selected Areas in Communications, 18(4):582–592, April 2000. |
[sBGP-a] | S. Kent Securing the Border Gateway Protocol, Technical Report, Internet Protocol Journal, Cisco Systems, September 2003. |
[soBGP] | R. White. Securing BGP through secure origin BGP. Technical report, Internet Protocol Journal, Cisco Systems, September 2003. |
[psBGP] | P. C. van Oorschot , T. Wan and E. Kranakis, and. On Interdomain Routing Security and Pretty Secure BGP (psBGP). ACM Transactions on Information and System Security, Vol. 10, No. 3, Article 11, July 2007. |
[IRV] | G. Goodell, W. Aiello, T. Griffin, J. Ioannidis and P. McDaniel. Working Around BGP: An Incremental Approach to Improving Security and Accuracy of Interdomain Routing. Proc. of Internet Society Symposium on Network and Distributed System Security (NDSS’03), 2003. |
[DNSV] | T. Bates, R. Bush, T. Li and Y. Rekhter. DNS-based NLRI origin AS verification in BGP. Internet Draft, draft-bates-bgp4-nlri-orig-verif-00.txt, July 1998. |
[Survey] | K. Butler, T. Farley, P. McDaniel and J. Rexford. A Survey of BGP Security. Technical Report TD-5UGJ33, AT&T Labs-Research, Florham Park, NJ, April 2005. |
[OriginAuth] | W. Aiello, J. Ioannidis, and P. McDaniel. Origin authentication in Interdomain routing. Proc. ACM Conference on Computer and Communications Security (CCS 2003), 2003. |
[Chains] | Y.-C Hu, A. Perrig, and D. Johnson. Efficient Security Mechanisms for Routing Protocols. Proc. of Symposium on Network and Distributed System Security (NDSS’03), February 2003. |
[SPV] | Y.-C. Hu, A. Perrig, and M. Sirbu. SPV: Secure path vector routing for securing BGP. In Proceedings of ACM SIGCOMM 2004, September 2004. |
[Sig-A] | Nicol, D., Smith, S., and Zhao, M. 2002. Efficient security for BGP route announcements. Dartmouth Computer Science Technical Report TR-2003-440. |
[Aggregate] | Zhao, M., Smith, S., and Nicol, D. Aggregated Path Authentication for Efficient BGP Security, Proc. 12th ACM conference on Computer and Communications Security, 2005 |
[Path] | K. Butler, P. McDaniel, and W. Aiello. Optimizing BGP Security by Exploiting Path Stability, Proc. 13th ACM Conference on Computer and Communications Security, 2006 |
[Listen] | Lakshminarayanan Subramanian, Volker Roth, Ion Stoica, Scott Shenker, and Randy H. Katz. Listen and Whisper: Security Mechanisms for BGP. In Proceedings of First Symposium on Networked Systems Design and Implementation (NSDI 2004), March 2004. |
[Byzantine] | Perlman, R. Network layer Protocols with Byzantine Robustness. Ph.D. thesis, Massachusetts Institute of Technology, Cambridge, MA. MIT/LCS/TR-429. 1988. |
[Predecessor] | Smith, B. and Garcia-Luna-Aceves, J. Efficient security mechanisms for the border gateway routing protocol. Computer Communications 21, 3, 203–210. 1998. |
[ | R. Oliveira, B. Zhang, D. Pei, r. Izhak-Ratzin, and L. Zhang. Quantifying path exploration in the internet. Proc. 6th ACM SIGCOMM conference on internet measurement, 2006. |
[Route Prediction] | N. Feamster, and J. Rexford . Network-wide prediction of BGP routes . IEEE/ACM Transactions on Networking, Vol. 15, Issue 2, April 2007 |
[Limiting Path Exploration] | J. Chandrashekar, Z. Duan, Z. Zhang, and J. Kransky. Limiting Path Exploration in BGP Proc. of the IEEE INFOCOM, 2005 |
[Routing Issues] | N Feamster, H Balakrishnan, J Rexford. Some Foundational Problems in interdomain Routing. Proceedings of Third Workshop on Hot Topics in Networks, ACM SIGCOMM, 2004 |
[Scaling Routing] | G. Huston. Scaling Interdomain Routing. Internet Protocol Journal 4(4), 2001. |
[Scaling Routing] | G. Huston. Commentary on Inter-Domain Routing in the Internet. RFC 3221, 2001 |
[Routing Futures] | G. Huston. Wither Routing? personal blog posting, October 2006. |
{Router Load] | D. Chang, R. Govindan, and J. Heidemann. An empiracal Study of Router Response to large BGP Routing Table Load. Proc. of the ACM SIGCOMM Internet Measurement Workshop, 2002. |