J. Rexford, J. Wang, Z. Xiao, and Y. Zhang, BGP routing stability of popular destinations, Proceedings of the second ACM SIGCOMM Workshop on Internet measurment , IMW '02, 2002.
DOI : 10.1145/637201.637232

D. Estrin, Y. Rekhter, and S. Hotz, A Unified Approach to Inter-Domain Routing, RFC, vol.1322, 1992.
DOI : 10.17487/rfc1322

S. Murphy, RFC 4272: BGP security vulnerabilities analysis

R. Mahajan, D. Wetherall, and T. Anderson, Understanding BGP misconfiguration, SIGCOMM '02: Proceedings of the 2002 conference on Applications , technologies, architectures, and protocols for computer communications, pp.3-16, 2002.
DOI : 10.1145/633025.633027

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.20.1862

M. Zhao, S. W. Smith, and D. M. Nicol, Aggregated path authentication for efficient BGP security, Proceedings of the 12th ACM conference on Computer and communications security , CCS '05, pp.128-138, 2005.
DOI : 10.1145/1102120.1102139

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.129.4588

S. Kent, Securing the border gateway protocol, The Internet Protocol Journal, vol.6, issue.3, pp.2-14, 2003.

A. Saxena and B. Soh, One-Way Signature Chaining: a new paradigm for group cryptosystems, International Journal of Information and Computer Security, vol.2, issue.3, pp.268-296, 2008.
DOI : 10.1504/IJICS.2008.020606