{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T18:26:05Z","timestamp":1772907965594,"version":"3.50.1"},"reference-count":38,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,11,5]],"date-time":"2024-11-05T00:00:00Z","timestamp":1730764800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,11,5]],"date-time":"2024-11-05T00:00:00Z","timestamp":1730764800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,11,5]]},"DOI":"10.1109\/nfv-sdn61811.2024.10807493","type":"proceedings-article","created":{"date-parts":[[2024,12,27]],"date-time":"2024-12-27T14:08:22Z","timestamp":1735308502000},"page":"1-7","source":"Crossref","is-referenced-by-count":4,"title":["PathSec: Path-Aware Secure Routing with Native Path Verification and Auditability"],"prefix":"10.1109","author":[{"given":"Magnos","family":"Martinello","sequence":"first","affiliation":[{"name":"Federal University of Esp&#x00ED;rito Santo,Department of Informatics,Brazil"}]},{"given":"Roberta Lima","family":"Gomes","sequence":"additional","affiliation":[{"name":"Federal University of Esp&#x00ED;rito Santo,Department of Informatics,Brazil"}]},{"given":"Everson S.","family":"Borges","sequence":"additional","affiliation":[{"name":"Federal University of Esp&#x00ED;rito Santo,Department of Informatics,Brazil"}]},{"given":"Henrique Coutinho","family":"Layber","sequence":"additional","affiliation":[{"name":"Federal University of Esp&#x00ED;rito Santo,Department of Informatics,Brazil"}]},{"given":"Vitor B.","family":"Bonella","sequence":"additional","affiliation":[{"name":"Federal University of Esp&#x00ED;rito Santo,Department of Informatics,Brazil"}]},{"given":"Cristina K.","family":"Dominicini","sequence":"additional","affiliation":[{"name":"Federal Institute of Esp&#x00ED;rito Santo,Department of Informatics,Brazil"}]},{"given":"Rafael","family":"Guimar\u00e3es","sequence":"additional","affiliation":[{"name":"Federal Institute of Esp&#x00ED;rito Santo,Department of Informatics,Brazil"}]},{"given":"Mois\u00e9s","family":"Ribeiro","sequence":"additional","affiliation":[{"name":"Federal University of Esp&#x00ED;rito Santo,Department of Informatics,Brazil"}]},{"given":"Marinho","family":"Barcellos","sequence":"additional","affiliation":[{"name":"University of Waikato,Department of Informatics,New Zealand"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1592568.1592583"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3085591"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2656877.2656889"},{"key":"ref4","article-title":"Epic: every packet is checked in the data plane of a path-aware internet","volume-title":"Proceedings of the 29th USENIX Conference on Security Symposium, ser. SEC\u201920","author":"Legner"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3031"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2015.7417124"},{"key":"ref7","article-title":"Network layer protocols with byzantine robustness","volume-title":"Ph.D. dissertation","author":"Perlman","year":"1988"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2004.1354494"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2079296.2079326"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2619239.2626323"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660349"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/IWQoS.2018.8624169"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-67080-5"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1142\/3254"},{"key":"ref15","article-title":"In-situ OAM Deployment","volume-title":"IETF, Internet-Draft draft-ietf-ippm-ioam-deployment-01","author":"Brockners","year":"2022"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2975911"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2024.3389457"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3409796"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056651"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/NetSoft57336.2023.10175482"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICSA.2017.33"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2021.103232"},{"key":"ref24","article-title":"Solana: A new architecture for a high performance blockchain v0. 8.13","author":"Yakovenko","year":"2018","journal-title":"Whitepaper"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3405894"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1017\/cbo9780511814549"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ACSSC.2007.4487229"},{"issue":"118","key":"ref28","first-page":"800","article-title":"Guide to enterprise password management (draft)","volume":"800","author":"Scarfone","year":"2009","journal-title":"NIST special publication"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3282308.3282312"},{"issue":"2014","key":"ref30","first-page":"1","article-title":"Ethereum: A secure decentralised generalised transaction ledger","volume":"151","author":"Wood","year":"2014","journal-title":"Ethereum project yellow paper"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/NetSoft48620.2020.9165501"},{"key":"ref32","article-title":"Proof of transit","volume-title":"IETF, Internet-Draft draft-ietf-sfcproof-of-transit-08","author":"Brockners","year":"2020"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-79263-5_10"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2016.7568576"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.2307\/3613934"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/1592568.1592583"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/1151659.1159933"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/3472873.3472881"}],"event":{"name":"2024 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN)","location":"Natal, Brazil","start":{"date-parts":[[2024,11,5]]},"end":{"date-parts":[[2024,11,7]]}},"container-title":["2024 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10807455\/10807462\/10807493.pdf?arnumber=10807493","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T04:40:21Z","timestamp":1769488821000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10807493\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,5]]},"references-count":38,"URL":"https:\/\/doi.org\/10.1109\/nfv-sdn61811.2024.10807493","relation":{},"subject":[],"published":{"date-parts":[[2024,11,5]]}}}