{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,7]],"date-time":"2025-06-07T04:49:01Z","timestamp":1749271741218},"publisher-location":"Singapore","reference-count":15,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811039683"},{"type":"electronic","value":"9789811039690"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-981-10-3969-0_45","type":"book-chapter","created":{"date-parts":[[2017,3,2]],"date-time":"2017-03-02T09:54:59Z","timestamp":1488448499000},"page":"410-415","source":"Crossref","is-referenced-by-count":6,"title":["QKDFlow: QKD Based Secure Communication Towards the OpenFlow Interface in SDN"],"prefix":"10.1007","author":[{"given":"Yan","family":"Peng","sequence":"first","affiliation":[]},{"given":"Chunqing","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Baokang","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Wanrong","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Bo","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Shasha","family":"Qiao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,3,3]]},"reference":[{"key":"45_CR1","unstructured":"Open Network Foundation: Software-defined networking: the new norm for networks. ONF White Paper (2012)"},{"key":"45_CR2","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1145\/1355734.1355746","volume":"38","author":"N McKeown","year":"2008","unstructured":"McKeown, N., Anderson, T., Balakrishnan, H., Parulkar, G., Peterson, L., Rexford, J., Shenker, S., Turner, J.: OpenFlow: enabling innovation in campus networks. ACM SIGCOMM Comput. Commun. Rev. 38, 69\u201374 (2008)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"45_CR3","unstructured":"MIT Technology Review: 10 breakthrough technologies, TR10: software-defined networking. http:\/\/www2.technologyreview.com\/article\/412194\/tr10-software-defined-networking\/ (2009)"},{"key":"45_CR4","unstructured":"ONF: OpenFlow Switch Specification V1.5.1"},{"key":"45_CR5","doi-asserted-by":"crossref","unstructured":"Dierks T., Rescorla, E.: Transport Layer Security Protocol. Network Working Group, RFC 5246 (2008)","DOI":"10.17487\/rfc5246"},{"key":"45_CR6","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1016\/j.aci.2014.02.001","volume":"10","author":"ML Das","year":"2014","unstructured":"Das, M.L., Samdaria, N.: On the security of SSL\/TLS-enabled applications. Appl. Comput. Inform. 10, 68\u201381 (2014)","journal-title":"Appl. Comput. Inform."},{"key":"45_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/BFb0055716","volume-title":"Advances in Cryptology \u2014 CRYPTO \u201898","author":"D Bleichenbacher","year":"1998","unstructured":"Bleichenbacher, D.: Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS #1. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 1\u201312. Springer, Heidelberg (1998). doi: 10.1007\/BFb0055716"},{"key":"45_CR8","unstructured":"Ray, M., Dispensa, S.: Renegotiating TLS (2009). http:\/\/extendedsubset.com\/Renegotiating_TLS.pdf"},{"key":"45_CR9","unstructured":"Marlinspike, M.: New tricks for defeating SSL in practice. In: BlackHat (2009)"},{"key":"45_CR10","doi-asserted-by":"crossref","unstructured":"Shin, D., Lopes, R: An empirical study of visual security cues to prevent the SSL stripping attack. In: Proceedings of the Computer Security Applications Conference (ACSAC 2011), pp. 287\u2013296 (2011)","DOI":"10.1145\/2076732.2076773"},{"key":"45_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"365","DOI":"10.1007\/978-3-642-34129-8_34","volume-title":"Information and Communications Security","author":"S Zhao","year":"2012","unstructured":"Zhao, S., Wang, D., Zhao, S., Yang, W., Ma, C.: Cookie-proxy: a scheme to prevent SSL Strip attack. In: Chim, T.W., Yuen, T.H. (eds.) ICICS 2012. LNCS, vol. 7618, pp. 365\u2013372. Springer, Heidelberg (2012). doi: 10.1007\/978-3-642-34129-8_34"},{"key":"45_CR12","doi-asserted-by":"crossref","unstructured":"Giesen, F., Kohlar, F., Stebila, D.: On the security of TLS renegotiation. In: Proceedings of the 20th ACM Conference on Computer and Communications Security (CCS) 2013 (2013)","DOI":"10.1145\/2508859.2516694"},{"key":"45_CR13","unstructured":"Zetter, K.: DigiNotar files for bankruptcy in wake of devastating hack. Wired Mag. (2011)"},{"key":"45_CR14","doi-asserted-by":"crossref","first-page":"10387","DOI":"10.1364\/OE.19.010387","volume":"19","author":"M Sasaki","year":"2011","unstructured":"Sasaki, M., Fujiwara, M., Ishizuka, H., Klaus, W., Wakui, K., Takeoka, M., Miki, S., Yamashita, T., Wang, Z., Tanaka, A.: Field test of quantum key distribution in the Tokyo QKD Network. Opt. Express 19, 10387\u201310409 (2011)","journal-title":"Opt. Express"},{"key":"45_CR15","doi-asserted-by":"crossref","unstructured":"Yin, H.-L., Chen, T.-Y., Yu, Z.-W., Liu, H., You, L.-X., Zhou, Y.-H., Chen, S.-J., Mao, Y., Huang, M.-Q., Zhang, W.-J.: Measurement device independent quantum key distribution over 404\u00a0km optical fibre. arXiv preprint arXiv:1606.06821 (2016)","DOI":"10.1103\/PhysRevLett.117.190501"}],"container-title":["Communications in Computer and Information Science","Geo-Spatial Knowledge and Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-3969-0_45","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,19]],"date-time":"2019-09-19T03:30:10Z","timestamp":1568863810000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-3969-0_45"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9789811039683","9789811039690"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-3969-0_45","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2017]]}}}