The following publications are possibly variants of this publication:
- Keychain-Based Signatures for Securing BGPHeng Yin, Bo Sheng, Haining Wang, Jianping Pan. jsac, 28(8):1308-1318, 2010. [doi]
- AT: An Origin Verification Mechanism Based on Assignment Track for Securing BGPNa Wang, Yingjian Zhi, Binqiang Wang. icc 2008: 5739-5745 [doi]
- POSTER: iPKI: Identity-based Private Key Infrastructure for Securing BGP ProtocolPeixin Chen, Xiaofeng Wang, Yilun Wu, Jinshu Su, Huan Zhou. ccs 2015: 1632-1634 [doi]