{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T18:24:17Z","timestamp":1765045457995,"version":"3.37.3"},"reference-count":33,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2021,11,1]],"date-time":"2021-11-01T00:00:00Z","timestamp":1635724800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,11,1]],"date-time":"2021-11-01T00:00:00Z","timestamp":1635724800000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"name":"Department of Science and Technology (DST), New Delhi"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2021,11,1]]},"DOI":"10.1109\/tdsc.2020.2968885","type":"journal-article","created":{"date-parts":[[2020,1,23]],"date-time":"2020-01-23T21:17:18Z","timestamp":1579814238000},"page":"2888-2906","source":"Crossref","is-referenced-by-count":18,"title":["Novel Protocols to Mitigate Network Slice Topology Learning Attacks and Protect Privacy of Users\u2019 Service Access Behavior in Softwarized 5G Networks"],"prefix":"10.1109","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8508-0211","authenticated-orcid":false,"given":"Vipin N.","family":"Sathi","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6633-962X","authenticated-orcid":false,"given":"Manikantan","family":"Srinivasan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8640-8511","authenticated-orcid":false,"given":"Prabhu K.","family":"Thiruvasagam","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1032-8857","authenticated-orcid":false,"given":"C. Siva Ram","family":"Murthy","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2828002"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2011.5983948"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12678-9_19"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72738-5_19"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2016.7509393"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600935"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.0001.1800575"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.041513.00174"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2981547"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2614976"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.5120\/428-631"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2016.05.002"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45741-3_18"},{"key":"ref19","first-page":"769","article-title":"User-to-user mutual authentication and key agreement scheme for LTE cellular system","volume":"18","author":"ramadan","year":"2016","journal-title":"Int J Netw Secur"},{"key":"ref28","article-title":"Proxy cryptography revisited","author":"ivan","year":"2003","journal-title":"Proc Symp Network and Distributed System Security"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600942"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0054122"},{"year":"2012","key":"ref3","article-title":"Network functions virtualization: An introduction, benefits, enablers, challenges and call for action"},{"year":"2014","key":"ref6","article-title":"Network functions virtualization; management and orchestration"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/1127345.1127346"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2018.2815418"},{"key":"ref8","first-page":"249","article-title":"A novel protocol for securing network slice component association and slice isolation in 5G networks","author":"vipin","year":"2018","journal-title":"Proc 21st ACM Int Conf Model Anal Simul Wireless Mobile Syst"},{"year":"0","key":"ref7","article-title":"Study on security aspects of 5G network slicing management"},{"key":"ref2","article-title":"NGMN 5G White Paper","author":"alliance","year":"2015","journal-title":"Next Generation Mobile Networks"},{"key":"ref9","article-title":"An end-to-end network slicing framework for 5G wireless communication systems","author":"li","year":"2016","journal-title":"CoRR"},{"article-title":"View on 5G architecture version 2.0","year":"2017","author":"group","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2018.8422725"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-40061-5_29"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-68914-0_4"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45682-1_30"},{"key":"ref23","first-page":"47","article-title":"Identity-based cryptosystems and signature schemes","author":"shamir","year":"1984","journal-title":"Proc Workshop Theory Appl Cryptographic Techn"},{"key":"ref26","first-page":"54","article-title":"Proxy cryptosystems: Delegation of the power to decrypt ciphertexts","volume":"80","author":"mambo","year":"1997","journal-title":"IEICE Trans Fundamentals Electron Commun Comput Sci"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39200-9_17"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8858\/9610161\/08967033.pdf?arnumber=8967033","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,21]],"date-time":"2022-02-21T21:54:59Z","timestamp":1645480499000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8967033\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,1]]},"references-count":33,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2020.2968885","relation":{},"ISSN":["1545-5971","1941-0018","2160-9209"],"issn-type":[{"type":"print","value":"1545-5971"},{"type":"electronic","value":"1941-0018"},{"type":"electronic","value":"2160-9209"}],"subject":[],"published":{"date-parts":[[2021,11,1]]}}}