{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T00:02:05Z","timestamp":1758931325383,"version":"3.44.0"},"reference-count":24,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2017,7,1]],"date-time":"2017-07-01T00:00:00Z","timestamp":1498867200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2017,7,1]],"date-time":"2017-07-01T00:00:00Z","timestamp":1498867200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2017,4,3]],"date-time":"2017-04-03T00:00:00Z","timestamp":1491177600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/100000180","name":"Department of Homeland Security Cyber Security Division - Secure Protocols for the Routing Infrastructure (SPRI) program","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000180","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000161","name":"NIST Information Technology Laboratory Internet Infrastructure Program","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000161","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computer Communications"],"published-print":{"date-parts":[[2017,7]]},"DOI":"10.1016\/j.comcom.2017.03.007","type":"journal-article","created":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T23:21:01Z","timestamp":1490311261000},"page":"75-85","update-policy":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":3,"special_numbering":"C","title":["Design and analysis of optimization algorithms to minimize cryptographic processing in BGP security protocols"],"prefix":"10.1016","volume":"106","author":[{"given":"Vinay K.","family":"Sriram","sequence":"first","affiliation":[]},{"given":"Doug","family":"Montgomery","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.comcom.2017.03.007_sbref0001","series-title":"IETF Internet Draft","article-title":"BGPSEC protocol specification","author":"Austein","year":"2017"},{"key":"10.1016\/j.comcom.2017.03.007_bib0002","unstructured":"J. Cowie, China\u2019s 18-minute mystery, Online Report from Renesys Corp., November 18, 2010. https:\/\/linproxy.fan.workers.dev:443\/http\/www.renesys.com\/blog\/2010\/11\/chinas-18-minute-mystery.shtml."},{"key":"10.1016\/j.comcom.2017.03.007_bib0003","unstructured":"Digital signature standard, FIPS publication 186-4, NIST Publication, July 2013. https:\/\/linproxy.fan.workers.dev:443\/http\/nvlpubs.nist.gov\/nistpubs\/FIPS\/NIST.FIPS.186-4.pdf."},{"key":"10.1016\/j.comcom.2017.03.007_bib0004","unstructured":"\u201ceBACS: ECRYPT Benchmarking of Cryptographic Systems,\u201d (version: supercop-20110708) Retrieved January 12, 2012, from https:\/\/linproxy.fan.workers.dev:443\/http\/bench.cr.yp.to\/results-sign.html."},{"key":"10.1016\/j.comcom.2017.03.007_sbref0002","series-title":"IETF Internet Draft: draft-ietf-sidr-bgpsec-rollover","article-title":"BGPsec router certificate rollover","author":"Gagliano","year":"2016"},{"key":"10.1016\/j.comcom.2017.03.007_sbref0003","series-title":"Black Hat Conference","article-title":"Defending against BGP man-in-the-middle attacks","author":"Hepner","year":"2009"},{"key":"10.1016\/j.comcom.2017.03.007_bib0007","unstructured":"G. Huston, BGP update reports,. Published online weekly. https:\/\/linproxy.fan.workers.dev:443\/http\/bgp.potaroo.net\/index-upd.html."},{"key":"10.1016\/j.comcom.2017.03.007_bib0008","unstructured":"G. Huston, AS6447\u00a0 BGP routing table analysis report, Published online weekly. https:\/\/linproxy.fan.workers.dev:443\/http\/bgp.potaroo.net\/as6447\/."},{"key":"10.1016\/j.comcom.2017.03.007_bib0009","unstructured":"G. Huston, IPv6 \/ IPv4 comparative statistics, Published online weekly. https:\/\/linproxy.fan.workers.dev:443\/http\/bgp.potaroo.net\/v6\/v6rpt.html."},{"key":"10.1016\/j.comcom.2017.03.007_sbref0004","series-title":"Proceedings of the IEEE Globecom Workshops","article-title":"Resource certification - a public key infrastructure for IP addresses and AS\u2019s","author":"Huston","year":"2009"},{"issue":"1,","key":"10.1016\/j.comcom.2017.03.007_bib0011","article-title":"Resource certification","volume":"12","author":"Huston","year":"2009","journal-title":"Internet Protoc. J."},{"key":"10.1016\/j.comcom.2017.03.007_bib0012","unstructured":"\u201cIntel \u00aeCore\u2122 i7-2600K Processor [Product Sheet],\u201dRetrieved January 10, 2012, from Intel Corporation website: https:\/\/linproxy.fan.workers.dev:443\/http\/ark.intel.com\/products\/52214."},{"key":"10.1016\/j.comcom.2017.03.007_bib0013","unstructured":"D. Karrenberg, Youtube and Pakistan telecom, Video presentation on YouTube, February 2008. https:\/\/linproxy.fan.workers.dev:443\/http\/www.youtube.com\/watch?v=IzLPKuAOe50."},{"issue":"4","key":"10.1016\/j.comcom.2017.03.007_bib0014","doi-asserted-by":"crossref","DOI":"10.1109\/49.839934","article-title":"Secure border gateway protocol (s-BGP)","volume":"18","author":"Kent","year":"2000","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"10.1016\/j.comcom.2017.03.007_sbref0007","series-title":"20th Euro-IX Forum, Amsterdam, NL","article-title":"Route server implementations performance","author":"Lambrianidis","year":"2012"},{"key":"10.1016\/j.comcom.2017.03.007_sbref0008","series-title":"IETF RFC 6811","article-title":"BGP prefix origin validation","author":"Mohapatra","year":"2013"},{"key":"10.1016\/j.comcom.2017.03.007_bib0017","series-title":"Proceedings of the International Conference on Passive and Active Measurement","first-page":"11","article-title":"Investigating occurrence of duplicate updates in BGP announcements","author":"Park","year":"2010"},{"key":"10.1016\/j.comcom.2017.03.007_sbref0010","series-title":"Passive and Active Measurements Conference","article-title":"Route flap damping made usable","author":"Pelsser","year":"2011"},{"key":"10.1016\/j.comcom.2017.03.007_sbref0011","series-title":"IETF RFC 4271","article-title":"A border gateway protocol 4 (BGP-4)","author":"Rekhter","year":"2006"},{"key":"10.1016\/j.comcom.2017.03.007_bib0020","unstructured":"\u201cRouteViews: Index of Peers for the Oregon RouteViews Collector,\u201d Retrieved January 15, 2012, University of Oregon RouteViews Project: https:\/\/linproxy.fan.workers.dev:443\/http\/www.routeviews.org\/peers\/route-views.oregon-ix.net.txt."},{"key":"10.1016\/j.comcom.2017.03.007_bib0021","unstructured":"\u201cRouteViews: Repository of Internet Measurement Data,\u201dRetrieved January 4, 2012 and also different dates in January-July, 2013, University of Oregon RouteViews Project: https:\/\/linproxy.fan.workers.dev:443\/http\/www.routeviews.org\/."},{"key":"10.1016\/j.comcom.2017.03.007_bib0022","unstructured":"H. Rudolph, S. Abt, Scaling BIRD routeservers, Presented at RIPE-73, October 2016, Madrid, Spain. https:\/\/linproxy.fan.workers.dev:443\/https\/ripe73.ripe.net\/presentations\/115-e-bru-20161026-RIPE73-scaling-bird-routeservers-final.pdf."},{"key":"10.1016\/j.comcom.2017.03.007_bib0023","doi-asserted-by":"crossref","unstructured":"S. Turner, BGP algorithms, key formats, and signature formats, IETF Internet Draft: draft-ietf-sidr-bgpsec-algs, November 2016. https:\/\/linproxy.fan.workers.dev:443\/https\/datatracker.ietf.org\/doc\/draft-ietf-sidr-bgpsec-algs\/.","DOI":"10.17487\/RFC8208"},{"key":"10.1016\/j.comcom.2017.03.007_bib0024","unstructured":"R. White, D. McPherson, S. Srihari, 2004, Practical BGP Addison-Wesley Professional."}],"container-title":["Computer Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/api.elsevier.com\/content\/article\/PII:S0140366417303365?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/api.elsevier.com\/content\/article\/PII:S0140366417303365?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,9,25]],"date-time":"2025-09-25T23:18:22Z","timestamp":1758842302000},"score":1,"resource":{"primary":{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/linkinghub.elsevier.com\/retrieve\/pii\/S0140366417303365"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7]]},"references-count":24,"alternative-id":["S0140366417303365"],"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1016\/j.comcom.2017.03.007","relation":{},"ISSN":["0140-3664"],"issn-type":[{"type":"print","value":"0140-3664"}],"subject":[],"published":{"date-parts":[[2017,7]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Design and analysis of optimization algorithms to minimize cryptographic processing in BGP security protocols","name":"articletitle","label":"Article Title"},{"value":"Computer Communications","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1016\/j.comcom.2017.03.007","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"Published by Elsevier B.V.","name":"copyright","label":"Copyright"}]}}