{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:54:14Z","timestamp":1740099254277,"version":"3.37.3"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030051945"},{"type":"electronic","value":"9783030051952"}],"license":[{"start":{"date-parts":[[2018,12,30]],"date-time":"2018-12-30T00:00:00Z","timestamp":1546128000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-05195-2_34","type":"book-chapter","created":{"date-parts":[[2018,12,29]],"date-time":"2018-12-29T11:53:53Z","timestamp":1546084433000},"page":"347-356","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Secure Network Coding for SDN-Based Mobile Small Cells"],"prefix":"10.1007","author":[{"given":"Vipindev","family":"Adat","sequence":"first","affiliation":[]},{"given":"Ilias","family":"Politis","sequence":"additional","affiliation":[]},{"given":"Christos","family":"Tselios","sequence":"additional","affiliation":[]},{"given":"Stavros","family":"Kotsopoulos","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,30]]},"reference":[{"key":"34_CR1","doi-asserted-by":"crossref","unstructured":"Tselios, C., Tsolis, G.: On QoE-awareness through virtualized probes in 5G networks. In: 2016 IEEE 21st International Workshop on Computer Aided Modelling and Design of Communication Links and Networks (CAMAD), pp. 159\u2013164, October 2016","DOI":"10.1109\/CAMAD.2016.7790351"},{"key":"34_CR2","doi-asserted-by":"crossref","unstructured":"Tselios, C., Politis, I., Tsagkaropoulos, M., Dagiuklas, T.: Valuing quality of experience: a brave new era of user satisfaction and revenue possibilities. In: 2011 50th FITCE Congress - \u201cICT: Bridging an Ever Shifting Digital Divide\u201d, pp. 1\u20136, August 2011","DOI":"10.1109\/FITCE.2011.6133422"},{"key":"34_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1007\/978-3-319-29919-8_13","volume-title":"Algorithmic Aspects of Cloud Computing","author":"C Tselios","year":"2016","unstructured":"Tselios, C., Tsolis, G.: A survey on software tools and architectures for deploying multimedia-aware cloud applications. In: Karydis, I., Sioutas, S., Triantafillou, P., Tsoumakos, D. (eds.) ALGOCLOUD 2015. LNCS, vol. 9511, pp. 168\u2013180. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-29919-8_13"},{"key":"34_CR4","doi-asserted-by":"crossref","unstructured":"Tselios, C., Politis, I., Kotsopoulos, S.: Enhancing SDN security for IoT-related deployments through blockchain. In: 2017 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN), pp. 303\u2013308, November 2017","DOI":"10.1109\/NFV-SDN.2017.8169860"},{"key":"34_CR5","doi-asserted-by":"crossref","unstructured":"Rodriguez, J., et al.: SECRET - secure network coding for reduced energy next generation mobile small cells: a European Training Network in wireless communications and networking for 5G. In: 2017 Internet Technologies and Applications (ITA), pp. 329\u2013333, September 2017","DOI":"10.1109\/ITECHA.2017.8101964"},{"key":"34_CR6","unstructured":"Cai, N., Yeung, R.W.: Secure network coding. In: Proceedings IEEE International Symposium on Information Theory, p. 323 (2002)"},{"issue":"1","key":"34_CR7","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1145\/1952982.1952989","volume":"14","author":"J Dong","year":"2011","unstructured":"Dong, J., Curtmola, R., Nita-Rotaru, C.: Practical defenses against pollution attacks in wireless network coding. ACM Trans. Inf. Syst. Secur. (TISSEC) 14(1), 7 (2011)","journal-title":"ACM Trans. Inf. Syst. Secur. (TISSEC)"},{"issue":"5","key":"34_CR8","doi-asserted-by":"publisher","first-page":"741","DOI":"10.1109\/TDSC.2012.39","volume":"9","author":"J Dong","year":"2012","unstructured":"Dong, J., Curtmola, R., Nita-Rotaru, C., Yau, D.K.Y.: Pollution attacks and defenses in wireless interflow network coding systems. IEEE Trans. Dependable Secur. Comput. 9(5), 741\u2013755 (2012)","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"issue":"6","key":"34_CR9","doi-asserted-by":"publisher","first-page":"2596","DOI":"10.1109\/TIT.2008.921711","volume":"54","author":"S Jaggi","year":"2008","unstructured":"Jaggi, S., et al.: Resilient network coding in the presence of byzantine adversaries. IEEE Trans. Inf. Theory 54(6), 2596\u20132603 (2008)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"10","key":"34_CR10","doi-asserted-by":"publisher","first-page":"4413","DOI":"10.1109\/TIT.2006.881746","volume":"52","author":"T Ho","year":"2006","unstructured":"Ho, T., et al.: A random linear network coding approach to multicast. IEEE Trans. Inf. Theory 52(10), 4413\u20134430 (2006)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"34_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1007\/978-3-642-01957-9_18","volume-title":"Applied Cryptography and Network Security","author":"S Agrawal","year":"2009","unstructured":"Agrawal, S., Boneh, D.: Homomorphic MACs: MAC-based integrity for network coding. In: Abdalla, M., Pointcheval, D., Fouque, P.-A., Vergnaud, D. (eds.) ACNS 2009. LNCS, vol. 5536, pp. 292\u2013305. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-01957-9_18"},{"key":"34_CR12","doi-asserted-by":"crossref","unstructured":"Zhang, P., Jiang, Y., Lin, C., Yao, H., Wasef, A., Shenz, X.: Padding for orthogonality: efficient subspace authentication for network coding. In: 2011 Proceedings IEEE INFOCOM, pp. 1026\u20131034, April 2011","DOI":"10.1109\/INFCOM.2011.5934876"},{"issue":"6","key":"34_CR13","doi-asserted-by":"publisher","first-page":"627","DOI":"10.1007\/s10207-016-0351-z","volume":"16","author":"A Esfahani","year":"2017","unstructured":"Esfahani, A., Mantas, G., Rodriguez, J., Neves, J.C.: An efficient homomorphic mac-based scheme against data and tag pollution attacks in network coding-enabled wireless networks. Int. J. Inf. Secur. 16(6), 627\u2013639 (2017)","journal-title":"Int. J. Inf. Secur."},{"issue":"7","key":"34_CR14","doi-asserted-by":"publisher","first-page":"510251","DOI":"10.1155\/2015\/510251","volume":"11","author":"A Esfahani","year":"2015","unstructured":"Esfahani, A., Yang, D., Mantas, G., Nascimento, A., Rodriguez, J.: Dual-homomorphic message authentication code scheme for network coding-enabled wireless sensor networks. Int. J. Distrib. Sens. Netw. 11(7), 510251 (2015)","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"34_CR15","doi-asserted-by":"crossref","unstructured":"Bolivar, L.T., Tselios, C., Area, D.M., Tsolis, G.: On the deployment of an open-source, 5G-aware evaluation testbed. In: 2018 6th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud), pp. 51\u201358, March 2018","DOI":"10.1109\/MobileCloud.2018.00016"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Broadband Communications, Networks, and Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-05195-2_34","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,13]],"date-time":"2019-11-13T02:33:49Z","timestamp":1573612429000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-05195-2_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12,30]]},"ISBN":["9783030051945","9783030051952"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-05195-2_34","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2018,12,30]]},"assertion":[{"value":"BROADNETS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Broadband Communications, Networks and Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Faro","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Portugal","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 September 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 September 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"broadnets2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/broadnets.org\/2018\/show\/home","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}