S. Kent, C. Lynn, and K. Seo, Secure border gateway protocol (S-BGP)[J]. Selected Areas in Communications, IEEE Journal on, vol.18, issue.4, pp.582-592, 2000.
DOI : 10.1109/49.839934

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.108.762

B. Kevin, F. Toni, and M. Patrick, A survey of BGP security, Pro-ceedings of ACM Internet Measurement Workshop, 2005.

S. Murphy, BGP security vulnerabilities analysis, IETF Internet RFC RFC, vol.4272, 2006.
DOI : 10.17487/rfc4272

M. Schuchard, A. Aohaisen, and D. Kune, Losing control of the internet, Proceedings of the 17th ACM conference on Computer and communications security, CCS '10, pp.726-728
DOI : 10.1145/1866307.1866411

U. Bornhauser and P. Martini, About prefix hijacking in the Internet, 2011 IEEE 36th Conference on Local Computer Networks, pp.143-146, 2011.
DOI : 10.1109/LCN.2011.6115172

Y. Liu, J. Su, R. C. Chang, and . Ldc, LDC: Detecting BGP Prefix Hijacking by Load Distribution Change, 2012 IEEE 26th International Parallel and Distributed Processing Symposium Workshops & PhD Forum, pp.1197-1203
DOI : 10.1109/IPDPSW.2012.147

M. Lad, D. Massey, and D. Pei, PHAS: A prefix hijack alert system, Proc. USENIX Security Symposium, pp.153-166, 2006.

C. Zheng, J. L. Pei, and D. , A light-weight distributed scheme for detecting ip prefix hijacks in real-time, ACM SIGCOMM Computer Communication Review, vol.37, issue.4, pp.277-288, 2007.
DOI : 10.1145/1282427.1282412

X. Hu and Z. M. Mao, Accurate Real-time Identification of IP Prefix Hijacking, 2007 IEEE Symposium on Security and Privacy (SP '07), pp.3-17, 2007.
DOI : 10.1109/SP.2007.7

R. White, Securing BGP through secure origin BGP (soBGP), The Internet Protocol Journal, vol.6, issue.3, pp.15-22, 2003.

P. C. Oorschot, T. Wan, and E. Kranakis, On interdomain routing security and pretty secure BGP (psBGP), ACM Transactions on Information and System Security, vol.10, issue.3, pp.10-11, 2007.
DOI : 10.1145/1266977.1266980