{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T06:39:48Z","timestamp":1774679988013,"version":"3.50.1"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J. Comput. Sci. Technol."],"published-print":{"date-parts":[[2020,7]]},"DOI":"10.1007\/s11390-020-9247-5","type":"journal-article","created":{"date-parts":[[2020,7,27]],"date-time":"2020-07-27T19:03:24Z","timestamp":1595876604000},"page":"863-874","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Preserving Privacy of Software-Defined Networking Policies by Secure Multi-Party Computation"],"prefix":"10.1007","volume":"35","author":[{"given":"Maryam","family":"Zarezadeh","sequence":"first","affiliation":[]},{"given":"Hamid","family":"Mala","sequence":"additional","affiliation":[]},{"given":"Homa","family":"Khajeh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,7,27]]},"reference":[{"key":"9247_CR1","unstructured":"Nadeau T D, Gray K. SDN: Software Defined Networks: An Authoritative Review of Network Programmability Technologies (1st edition). O\u2019Reilly Media, 2013."},{"key":"9247_CR2","doi-asserted-by":"crossref","unstructured":"Feldmann A, Heyder P, Kreutzer M et al. NetCo: Reliable routing with unreliable routers. In Proc. the 46th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks Workshop, June 2016, pp.128-135.","DOI":"10.1109\/DSN-W.2016.38"},{"issue":"2","key":"9247_CR3","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1145\/1355734.1355746","volume":"38","author":"N McKeown","year":"2008","unstructured":"McKeown N, Anderson T, Balakrishnan H et al. OpenFlow: Enabling innovation in campus networks. ACM SIGCOMM Computer Communication Review, 2008, 38(2): 69-74.","journal-title":"ACM SIGCOMM Computer Communication Review"},{"issue":"7","key":"9247_CR4","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1109\/MCOM.2013.6553676","volume":"51","author":"S Sezer","year":"2013","unstructured":"Sezer S, Scott-Hayward S, Chouhan P K et al. Are we ready for SDN? Implementation challenges for software-defined networks. IEEE Communications Magazine, 2013, 51(7): 36-43.","journal-title":"IEEE Communications Magazine"},{"key":"9247_CR5","unstructured":"Cramer R, Damg\u00e5rd I, Nielsen J B. Secure Multiparty Computation and Secret Sharing (1st edition). Cambridge University Press, 2013."},{"key":"9247_CR6","doi-asserted-by":"crossref","unstructured":"Yao A C. Protocols for secure computations. In Proc. the 23rd Annual Symposium on Foundations of Computer Science, November 1982, pp.160-164.","DOI":"10.1109\/SFCS.1982.38"},{"key":"9247_CR7","doi-asserted-by":"crossref","unstructured":"Goldreich O, Micali S, Wigderson A. How to play any mental game or a completeness theorem for protocols with honest majority. In Proc. the 19th Annual ACM Symposium on Theory of Computing, January 1987, pp.218-229.","DOI":"10.1145\/28395.28420"},{"key":"9247_CR8","doi-asserted-by":"crossref","unstructured":"Aven T, Jensen U. Stochastic Models in Reliability (2nd edition). Springer, 2013.","DOI":"10.1007\/978-1-4614-7894-2"},{"issue":"2","key":"9247_CR9","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1109\/4235.996017","volume":"6","author":"K Deb","year":"2002","unstructured":"Deb K, Pratap A, Agarwal S, Meyarivan T. A fast and elitist multiobjective genetic algorithm: NSGA-II. IEEE Transactions on Evolutionary Computation, 2002, 6(2): 182-197.","journal-title":"IEEE Transactions on Evolutionary Computation"},{"key":"9247_CR10","unstructured":"Rekhter Y, Li T. A border gateway protocol 4 (BGP-4). https:\/\/www.rfc-editor.org\/rfc\/pdfrfc\/rfc1771.txt.pdf, May 2020."},{"issue":"2","key":"9247_CR11","doi-asserted-by":"publisher","first-page":"1011","DOI":"10.1109\/TNET.2015.2409233","volume":"24","author":"M Zhao","year":"2016","unstructured":"Zhao M, Zhou W, Gurney A J, Haeberlen A, Sherr M, Loo B T. Private and verifiable interdomain routing decisions. IEEE\/ACM Transactions on Networking, 2016, 24(2): 1011-1024.","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"9247_CR12","doi-asserted-by":"crossref","unstructured":"Gupta D, Segal A, Panda A et al. A new approach to interdomain routing based on secure multi-party computation. In Proc. the 11th ACM Workshop on Hot Topics in Networks, October 2012, pp.37-42.","DOI":"10.1145\/2390231.2390238"},{"issue":"3","key":"9247_CR13","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1515\/popets-2017-0033","volume":"2017","author":"G Asharov","year":"2017","unstructured":"Asharov G, Demmler D, Schapira M, Schneider T, Segev G, Shenker S, Zohner M. Privacy-preserving interdomain routing at Internet scale. Proceedings on Privacy Enhancing Technologies, 2017, 2017(3): 147-167.","journal-title":"Proceedings on Privacy Enhancing Technologies"},{"key":"9247_CR14","doi-asserted-by":"crossref","unstructured":"Dethise A, Chiesa M, Canini M. Prelude: Ensuring interdomain loop-freedom in SDN-enabled networks. In Proc. the 2nd Asia-Pacific Workshop on Networking, August 2018, pp.50-56.","DOI":"10.1145\/3232565.3232570"},{"key":"9247_CR15","unstructured":"Kukkala V B, Saini J S, Iyengar S. Secure multiparty computation of a social network. https:\/\/eprint.iacr.org\/2015\/817.pdf, May 2020."},{"key":"9247_CR16","doi-asserted-by":"crossref","unstructured":"Boshrooyeh S T, K\u00fcp\u00e7\u00fc A, \u00d6zkasap \u00d6. Privado: Privacypreserving group-based advertising using multiple independent social network providers. https:\/\/eprint.iacr.org\/2019\/372.pdf, May 2020.","DOI":"10.1145\/3386154"},{"key":"9247_CR17","unstructured":"Demmler D, Schneider T, Zohner M. Ad-hoc secure twoparty computation on mobile devices using hardware tokens. In Proc. the 23rd USENIX Security Symposium, August 2014, pp.893-908."},{"key":"9247_CR18","doi-asserted-by":"crossref","unstructured":"Oleshchuk V. Internet of Things and privacy preserving technologies. In Proc. the 1st International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology, May 2009, pp.336-340.","DOI":"10.1109\/WIRELESSVITAE.2009.5172470"},{"key":"9247_CR19","doi-asserted-by":"crossref","unstructured":"von Maltitz M, Carle G. Leveraging secure multiparty computation in the Internet of Things. In Proc. the 16th Annual International Conference on Mobile Systems, Applications, and Services, June 2018, pp.508-510.","DOI":"10.1145\/3210240.3223569"},{"key":"9247_CR20","doi-asserted-by":"crossref","unstructured":"Chiesa M, di Lallo R, Lospoto G, Mostafaei H, Rimondini M, di Battista G. PrIXP: Preserving the privacy of routing policies at Internet eXchange points. In Proc. the 2017 IFIP\/IEEE Symposium on Integrated Network and Service Management, May 2017, pp.435-441.","DOI":"10.23919\/INM.2017.7987309"},{"key":"9247_CR21","doi-asserted-by":"crossref","unstructured":"Chiesa M, Demmler D, Canini M, Schapira M, Schneider T. SIXPACK: Securing internet exchange points against curious onlookers. In Proc. the 13th International Conference on Emerging Networking Experiments and Technologies, December 2017, pp.120-133.","DOI":"10.1145\/3143361.3143362"},{"key":"9247_CR22","unstructured":"Cho C, El Defrawy K, Kim H T J, Lampkins J D. Privacy-preserving multi-client and cloud computation with application to secure navigation. U.S. Patent, 2019. http:\/\/www.freepatentsonline.com\/20190042788.pdf, May 2020."},{"issue":"1","key":"9247_CR23","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/JPROC.2014.2371999","volume":"103","author":"D Kreutz","year":"2015","unstructured":"Kreutz D, Ramos F M, Ver\u00edssimo P, Rothenberg C E, Azodolmolky S, Uhlig S. Software-defined networking: A comprehensive survey. Proceedings of the IEEE, 2015, 103(1): 14-76.","journal-title":"Proceedings of the IEEE"},{"key":"9247_CR24","doi-asserted-by":"crossref","unstructured":"Hazay C, Lindell Y. Efficient Secure Two-Party Protocols: Techniques and Constructions. Springer-Verlag Berlin Heidelberg, 2010.","DOI":"10.1007\/978-3-642-14303-8"},{"key":"9247_CR25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30042-4","volume-title":"Engineering Secure Two-Party Computation Protocols: Design, Optimization, and Applications of Efficient Secure Function Evaluation","author":"T Schneider","year":"2012","unstructured":"Schneider T. Engineering Secure Two-Party Computation Protocols: Design, Optimization, and Applications of Efficient Secure Function Evaluation. Springer-Verlag Berlin Heidelberg, 2012."},{"issue":"11","key":"9247_CR26","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir A. How to share a secret. Communications of the ACM, 1979, 22(11): 612-613.","journal-title":"Communications of the ACM"},{"key":"9247_CR27","unstructured":"Rabin M O. How to exchange secrets with oblivious transfer. https:\/\/eprint.iacr.org\/2005\/187.pdf, May 2020."},{"key":"9247_CR28","doi-asserted-by":"crossref","unstructured":"Beaver D. Efficient multiparty protocols using circuit randomization. In Proc. the 11th Annual International Cryptology Conference, August 1991, pp.420-432.","DOI":"10.1007\/3-540-46766-1_34"},{"key":"9247_CR29","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1016\/j.ress.2016.06.008","volume":"154","author":"FP Coolen","year":"2016","unstructured":"Coolen F P, Coolen-Maturi T. The structure function for system reliability as predictive (imprecise) probability. Reliability Engineering & System Safety, 2016, 154: 180-187.","journal-title":"Reliability Engineering & System Safety"},{"key":"9247_CR30","unstructured":"Rausand M, H\u00f8yland A. System Reliability Theory: Models, Statistical Methods and Applications (2nd edition). Wiley-Interscience, 2003."},{"key":"9247_CR31","doi-asserted-by":"crossref","unstructured":"Gertsbakh I, Shpungin Y. Network Reliability and Resilience. Springer, 2011.","DOI":"10.1007\/978-3-642-22374-7"},{"issue":"9","key":"9247_CR32","doi-asserted-by":"publisher","first-page":"992","DOI":"10.1016\/j.ress.2005.11.018","volume":"91","author":"A Konak","year":"2006","unstructured":"Konak A, Coit D W, Smith A E. Multi-objective optimization using genetic algorithms: A tutorial. Reliability Engineering & System Safety, 2006, 91(9): 992-1007.","journal-title":"Reliability Engineering & System Safety"},{"key":"9247_CR33","doi-asserted-by":"publisher","first-page":"3978","DOI":"10.1016\/j.proeng.2011.08.745","volume":"15","author":"Y Yusoff","year":"2011","unstructured":"Yusoff Y, Ngadiman M S, Zain A M. Overview of NSGAII for optimizing machining process parameters. Procedia Engineering, 2011, 15: 3978-3983.","journal-title":"Procedia Engineering"},{"issue":"2","key":"9247_CR34","doi-asserted-by":"publisher","first-page":"763","DOI":"10.1109\/TR.2015.2513017","volume":"65","author":"JL Marichal","year":"2016","unstructured":"Marichal J L. Structure functions and minimal path sets. IEEE Transactions on Reliability, 2016, 65(2): 763-768.","journal-title":"IEEE Transactions on Reliability"},{"key":"9247_CR35","unstructured":"Goldreich O. Foundations of Cryptography: Volume 2, Basic Applications (1st edition). Cambridge University Press, 2009."},{"key":"9247_CR36","unstructured":"Deb K. Multi-objective optimization using evolutionary algorithms (1st edition). Wiley, 2001."},{"key":"9247_CR37","doi-asserted-by":"crossref","unstructured":"Heller B, Sherwood R, McKeown N. The controller placement problem. In Proc. the 1st Workshop on Hot Topics in Software Defined Networks, August 2012, pp.7-12.","DOI":"10.1145\/2342441.2342444"}],"container-title":["Journal of Computer Science and Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11390-020-9247-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11390-020-9247-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11390-020-9247-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,26]],"date-time":"2021-07-26T23:59:06Z","timestamp":1627343946000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11390-020-9247-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7]]},"references-count":37,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2020,7]]}},"alternative-id":["9247"],"URL":"https:\/\/doi.org\/10.1007\/s11390-020-9247-5","relation":{},"ISSN":["1000-9000","1860-4749"],"issn-type":[{"value":"1000-9000","type":"print"},{"value":"1860-4749","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,7]]},"assertion":[{"value":"3 December 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 May 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 July 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}