{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T13:18:24Z","timestamp":1725801504577},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,7]]},"DOI":"10.1109\/icufn.2015.7182680","type":"proceedings-article","created":{"date-parts":[[2015,8,13]],"date-time":"2015-08-13T16:20:36Z","timestamp":1439482836000},"page":"921-925","source":"Crossref","is-referenced-by-count":4,"title":["Securing distributed SDN with IBC"],"prefix":"10.1109","author":[{"family":"Jun-Huy Lam","sequence":"first","affiliation":[]},{"family":"Sang-Gon Lee","sequence":"additional","affiliation":[]},{"family":"Hoon-Jae Lee","sequence":"additional","affiliation":[]},{"given":"Yustus Eko","family":"Oktian","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"OpenDaylight","year":"0","key":"ref10"},{"journal-title":"HP","article-title":"SDN Dev Center: Unlock networking innovation","year":"0","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/IEEC.2009.33"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39568-7_5"},{"journal-title":"Symposium on Cryptography and In'ormation Security 2000 (SCIS 2000)","article-title":"Cryptosystems based on pairing","year":"2000","author":"ryuichi","key":"ref14"},{"journal-title":"Proceedings of Annual International Cryptology Conference","article-title":"Identity-Based Encryption from the Weil Pairingy","year":"2001","author":"boneh","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1049\/el:20020387"},{"journal-title":"Proc IEEE Computer Security Foundations Workshop","article-title":"Identity Based Authenticated key Agreemet Protocols from Pairings","year":"2003","author":"chen","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2014.6925802"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-006-0011-9"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2010.5735752"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/HPEC.2013.6670325"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1007\/978-3-642-36516-4_4","article-title":"FlowSense: Monitoring Network Utilization with Zero Measurement Cost","author":"yu","year":"2013","journal-title":"Proc 3rd Passive and Active Measurement Wksp"},{"journal-title":"Proc Internet Network Management Conf Research on Enterprise Networking","article-title":"Extensible and Scalable Network Monitoring Using OpenSAFE","year":"2010","author":"ballad","key":"ref5"},{"year":"0","key":"ref8","article-title":"Cisco Application Centric Infrastructure: Use ACI as a Technology-Based Catalyst for IT Transformation White Paper"},{"journal-title":"Openflow","year":"0","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SDN4FNS.2013.6702548"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2491185.2491193"},{"key":"ref9","first-page":"151","article-title":"OpenFlow Vulnerability Assessment","author":"kevin","year":"2013","journal-title":"HotSDN 2013 Proceedings of the second ACM SIGCOMM workshop on Hot topics in software defined networking"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13797-6_9"},{"journal-title":"HP","article-title":"HP VAN SDN Controller Administrator Guide","year":"2014","key":"ref22"},{"journal-title":"European Union Agency for Network and Information Security (ENISA)","article-title":"Algorithms, Key Sizes and Parameter Report-2013 recommendations","year":"2013","author":"smart","key":"ref21"},{"journal-title":"OpenDaylight","article-title":"CrossProject: OpenDaylight Security Analysis","year":"0","key":"ref23"}],"event":{"name":"2015 Seventh International Conference on Ubiquitous and Future Networks (ICUFN)","start":{"date-parts":[[2015,7,7]]},"location":"Sapporo, Japan","end":{"date-parts":[[2015,7,10]]}},"container-title":["2015 Seventh International Conference on Ubiquitous and Future Networks"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7172793\/7182475\/07182680.pdf?arnumber=7182680","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T17:35:53Z","timestamp":1498239353000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7182680\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,7]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/icufn.2015.7182680","relation":{},"subject":[],"published":{"date-parts":[[2015,7]]}}}