{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T01:37:59Z","timestamp":1729647479838,"version":"3.28.0"},"reference-count":47,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,10]]},"DOI":"10.1109\/icnp.2011.6089046","type":"proceedings-article","created":{"date-parts":[[2011,12,6]],"date-time":"2011-12-06T16:01:09Z","timestamp":1323187269000},"page":"143-154","source":"Crossref","is-referenced-by-count":17,"title":["Network fault localization with small TCB"],"prefix":"10.1109","author":[{"given":"Xin","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Zongwei","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Geoff","family":"Hasker","sequence":"additional","affiliation":[]},{"given":"Adrian","family":"Perrig","sequence":"additional","affiliation":[]},{"given":"Virgil","family":"Gligor","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/1375457.1375480"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1145\/774763.774775"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2004.22"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.32"},{"key":"18","first-page":"92","article-title":"Fast encryption and authentication: XCBC encryption and XECB authentication modes","volume":"2355","author":"gligor","year":"2001","journal-title":"LNCS"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.27"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2009.2026415"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2005.49"},{"journal-title":"Usenix Security","article-title":"Sane: A protection architecture for enterprise networks","year":"2006","author":"casado","key":"16"},{"key":"39","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.4"},{"key":"13","first-page":"15","article-title":"XOR MACs: New methods for message authentication using finite pseudorandom functions","author":"bellare","year":"1995","journal-title":"CRYPTO'95"},{"key":"14","first-page":"384","article-title":"A block-cipher mode of operation for parallelizable message authentication(PMAC)","volume":"2322","author":"black","year":"2002","journal-title":"LNCS"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1145\/1734583.1734593"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1002\/dac.505"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2008.217"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78967-3_20"},{"journal-title":"TPM Specification","year":"2009","key":"21"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/1096536.1096541"},{"key":"43","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2004.1301320"},{"journal-title":"Isp Security Bof","year":"0","author":"thomas","key":"42"},{"journal-title":"Aes Based Authentication Cores","year":"0","key":"41"},{"key":"40","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2003.822655"},{"journal-title":"IEEE\/ACM Transactions on Networking","article-title":"Tva: A dos-limiting network architecture","year":"0","author":"yang","key":"45"},{"key":"44","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2006.877133"},{"key":"47","doi-asserted-by":"publisher","DOI":"10.1145\/1544012.1544036"},{"key":"46","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.45"},{"journal-title":"USENIX NSDI","article-title":"Not-a-bot: Improving service availability in the face of botnet attacks","year":"2009","author":"gummadi","key":"22"},{"journal-title":"Trends in Denial of Service Attack Technology","year":"0","author":"houle","key":"23"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2000.848451"},{"journal-title":"Intel Trusted Execution Techonology - Software Development Guide","year":"2008","key":"25"},{"journal-title":"Intel Advanced Encryption Standard (Aes) Instructions Set","year":"2010","key":"26"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1145\/354871.354874"},{"journal-title":"Shining Light on Dark Address Space","year":"0","author":"labovitz","key":"28"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1145\/1851182.1851210"},{"journal-title":"The Netperf Benchmark","year":"0","key":"3"},{"journal-title":"Cisco security hole a whopper","year":"0","key":"2"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/570681.570684"},{"journal-title":"Arbor Networks Worldwide Security Survey 2010","year":"0","key":"1"},{"key":"30","doi-asserted-by":"crossref","DOI":"10.1109\/TMC.2007.1036","article-title":"An acknowledgement-based approach for the detection of routing misbehavior in MANETs","author":"liu","year":"2007","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2007.4375850"},{"journal-title":"Report on Dimacs Workshop on Large-scale Internet Attacks","year":"0","author":"ao","key":"6"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.17"},{"volume":"2","journal-title":"Advanced Micro Devices AMD 64 Architecture Programmer's Manual","article-title":"System programming","year":"2007","key":"5"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1109\/EBISS.2009.5138125"},{"journal-title":"Symantec Warns of Router Compromise","year":"0","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/1284680.1341892"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2004.1354494"}],"event":{"name":"2011 19th IEEE International Conference on Network Protocols (ICNP)","start":{"date-parts":[[2011,10,17]]},"location":"Vancouver, AB, Canada","end":{"date-parts":[[2011,10,20]]}},"container-title":["2011 19th IEEE International Conference on Network Protocols"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6085960\/6089029\/06089046.pdf?arnumber=6089046","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,20]],"date-time":"2019-06-20T08:17:53Z","timestamp":1561018673000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6089046\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,10]]},"references-count":47,"URL":"http:\/\/dx.doi.org\/10.1109\/icnp.2011.6089046","relation":{},"subject":[],"published":{"date-parts":[[2011,10]]}}}