{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T16:10:54Z","timestamp":1729613454462,"version":"3.28.0"},"reference-count":5,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,8]]},"DOI":"10.1109\/apsitt.2015.7217098","type":"proceedings-article","created":{"date-parts":[[2015,8,31]],"date-time":"2015-08-31T21:45:54Z","timestamp":1441057554000},"page":"1-3","source":"Crossref","is-referenced-by-count":6,"title":["Highly secure communication service architecture using SDN switch"],"prefix":"10.1109","author":[{"given":"Masahiro","family":"Furukawa","sequence":"first","affiliation":[]},{"given":"Kouki","family":"Kuroda","sequence":"additional","affiliation":[]},{"given":"Takeshi","family":"Ogawa","sequence":"additional","affiliation":[]},{"given":"Noriharu","family":"Miyaho","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/978-3-642-10366-7_1","article-title":"Related-key cryptanalysis of the full AES-192 and AES-256","volume":"5912","author":"biryukov","year":"2009","journal-title":"ASIACRYPT 2009 of LNCS"},{"key":"ref3","first-page":"56","article-title":"Covert channels in the HTTP network Protocol: Channel characterization and detecting Man-in-the-Middle attacks","author":"brown","year":"2010","journal-title":"The Proceedings of the 5th International Conference on information warfare and security (ICIW2010)"},{"key":"ref5","first-page":"344","article-title":"Biclique cryptanalysis of the full AES","volume":"7073","author":"bogdanov","year":"2011","journal-title":"LNCS ASIACRYPT"},{"year":"2014","key":"ref2","article-title":"Software Defined Networking: The New Norm for Network"},{"key":"ref1","first-page":"266","article-title":"Study of a Secure Backup Network Mechanism for Disaster Recovery and Practical Network Applications","volume":"3","author":"miyaho","year":"2010","journal-title":"IARIA Journals"}],"event":{"name":"2015 10th Asia-Pacific Symposium on Information and Telecommunication Technologies (APSITT)","start":{"date-parts":[[2015,8,4]]},"location":"Colombo, Sri Lanka","end":{"date-parts":[[2015,8,7]]}},"container-title":["2015 10th Asia-Pacific Symposium on Information and Telecommunication Technologies (APSITT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7210373\/7217073\/07217098.pdf?arnumber=7217098","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T18:39:52Z","timestamp":1498243192000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7217098\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8]]},"references-count":5,"URL":"https:\/\/doi.org\/10.1109\/apsitt.2015.7217098","relation":{},"subject":[],"published":{"date-parts":[[2015,8]]}}}