{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T21:57:50Z","timestamp":1757627870894,"version":"3.44.0"},"reference-count":34,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T00:00:00Z","timestamp":1751414400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T00:00:00Z","timestamp":1751414400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key R&D Program of China","doi-asserted-by":"publisher","award":["2022YFB2901502"],"award-info":[{"award-number":["2022YFB2901502"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"publisher","award":["62172345,62302409"],"award-info":[{"award-number":["62172345,62302409"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,7,2]]},"DOI":"10.1109\/iwqos65803.2025.11143374","type":"proceedings-article","created":{"date-parts":[[2025,9,9]],"date-time":"2025-09-09T17:29:52Z","timestamp":1757438992000},"page":"1-10","source":"Crossref","is-referenced-by-count":0,"title":["IVeri: A Scalable Privacy-Preserving Interdomain Configuration Verification Tool via Secure Multi-Party Computation"],"prefix":"10.1109","author":[{"given":"Mingjun","family":"Fang","sequence":"first","affiliation":[{"name":"School of Informatics, Xiamen University,Xiamen Key Laboratory of Intelligent Storage and Computing"}]},{"given":"Yuntao","family":"Zhao","sequence":"additional","affiliation":[{"name":"School of Informatics, Xiamen University,Xiamen Key Laboratory of Intelligent Storage and Computing"}]},{"given":"Qiuyue","family":"Qin","sequence":"additional","affiliation":[{"name":"School of Informatics, Xiamen University,Xiamen Key Laboratory of Intelligent Storage and Computing"}]},{"given":"Xing","family":"Fang","sequence":"additional","affiliation":[{"name":"School of Informatics, Xiamen University,Xiamen Key Laboratory of Intelligent Storage and Computing"}]},{"given":"Huisan","family":"Xu","sequence":"additional","affiliation":[{"name":"School of Informatics, Xiamen University,Xiamen Key Laboratory of Intelligent Storage and Computing"}]},{"given":"Lizhao","family":"You","sequence":"additional","affiliation":[{"name":"School of Informatics, Xiamen University"}]},{"given":"Qiao","family":"Xiang","sequence":"additional","affiliation":[{"name":"School of Informatics, Xiamen University,Xiamen Key Laboratory of Intelligent Storage and Computing"}]},{"given":"Jiwu","family":"Shu","sequence":"additional","affiliation":[{"name":"School of Informatics, Xiamen University,Xiamen Key Laboratory of Intelligent Storage and Computing"}]}],"member":"263","reference":[{"key":"ref2","author":"Abrams","year":"2019","journal-title":"BGP Route Leak Causes Cloudflare and Amazon AWS Problems"},{"key":"ref3","author":"Abrams","year":"2021","journal-title":"Facebook, Instagram, and WhatsApp Back Online after BGP Fix"},{"key":"ref4","author":"Afolayan","year":"2018","journal-title":"How bad is mainone\u2019s bgp error and why they must prevent a recurrence"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2815675.2815712"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098834"},{"key":"ref7","first-page":"1","article-title":"Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation (Extended Abstract)","volume-title":"STOC\u201988","author":"Ben-Or","year":"1988"},{"key":"ref8","first-page":"15","article-title":"Sepia: privacy-preserving aggregation of multi-domain network events and statistics","volume-title":"Proceedings of the 19th USENIX Conference on Security, USENIX Security\u201910","author":"Burkhart","year":"2010"},{"key":"ref9","volume-title":"The CAIDA AS Relationships Dataset","year":"2023"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_15"},{"key":"ref11","first-page":"469","article-title":"A General Approach to Network Configuration Analysis","volume-title":"NSDI\u201915","author":"Fogel","year":"2015"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/233551.233553"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382251"},{"key":"ref14","first-page":"437","article-title":"NetReview: Detecting When Interdomain Routing Goes Wrong","volume-title":"NSDI\u201909","author":"Haeberlen","year":"2009"},{"key":"ref15","author":"Maddury","year":"2024","journal-title":"Seagull: Privacy preserving network verification system"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3341302.3342094"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2012.12.029"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3618257.3624799"},{"key":"ref19","first-page":"1575","article-title":"MP-SPDZ: A Versatile Framework for Multi-Party Computation","volume-title":"CCS\u201920","author":"Kellerl","year":"2020"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-11245-5_18"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-71677-8_23"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/100216.100289"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.17487\/rfc1771"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2005.857111"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3405900"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934874"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2012.2187924"},{"key":"ref29","author":"Xu","year":"2022","journal-title":"Network Configuration Survey"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3600061.3600064"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1982.38"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3406217"},{"key":"ref33","first-page":"1153","article-title":"Obliv-c: A language for extensible dataoblivious computation","author":"Zahur","year":"2015","journal-title":"IACR Cryptology ePrint Archive, 2015"},{"key":"ref34","first-page":"601","article-title":"Differential network analysis","volume-title":"19th USENIX Symposium on Networked Systems Design and Implementation (NSDI 22)","author":"Zhang","year":"2022"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3544216.3544264"}],"event":{"name":"2025 IEEE\/ACM International Symposium on Quality of Service (IWQoS)","location":"Gold Coast, Australia","start":{"date-parts":[[2025,7,2]]},"end":{"date-parts":[[2025,7,4]]}},"container-title":["2025 IEEE\/ACM 33rd International Symposium on Quality of Service (IWQoS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11143240\/11143247\/11143374.pdf?arnumber=11143374","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T05:05:54Z","timestamp":1757480754000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11143374\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,2]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/iwqos65803.2025.11143374","relation":{},"subject":[],"published":{"date-parts":[[2025,7,2]]}}}