{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:22:52Z","timestamp":1761402172702,"version":"3.37.3"},"reference-count":42,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2021,9,1]],"date-time":"2021-09-01T00:00:00Z","timestamp":1630454400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,9,1]],"date-time":"2021-09-01T00:00:00Z","timestamp":1630454400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,9,1]],"date-time":"2021-09-01T00:00:00Z","timestamp":1630454400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw. Serv. Manage."],"published-print":{"date-parts":[[2021,9]]},"DOI":"10.1109\/tnsm.2021.3081014","type":"journal-article","created":{"date-parts":[[2021,5,17]],"date-time":"2021-05-17T21:08:26Z","timestamp":1621285706000},"page":"3140-3153","source":"Crossref","is-referenced-by-count":10,"title":["On Achieving Trustworthy Service Function Chaining"],"prefix":"10.1109","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3103-4812","authenticated-orcid":false,"given":"Montida","family":"Pattaranantakul","sequence":"first","affiliation":[]},{"given":"Qipeng","family":"Song","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6626-9120","authenticated-orcid":false,"given":"Yanmei","family":"Tian","sequence":"additional","affiliation":[]},{"given":"Licheng","family":"Wang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0379-7089","authenticated-orcid":false,"given":"Zonghua","family":"Zhang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9255-2114","authenticated-orcid":false,"given":"Ahmed","family":"Meddahi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0842-1873","authenticated-orcid":false,"given":"Chalee","family":"Vorakulpipat","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"The pairing-based cryptography library","year":"2006","author":"lynn","key":"ref39"},{"journal-title":"OPeNDAP project","year":"2020","key":"ref38"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/1533057.1533080"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315280"},{"journal-title":"OpenFlow Switch Specification","year":"2012","key":"ref31"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.17487\/rfc7498"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-37231-6_16"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/11761679_28"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/1410234.1410237"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8300"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2016.7568569"},{"journal-title":"Python Binding for PBC","year":"2017","key":"ref40"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2017.8056994"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2810880"},{"key":"ref13","first-page":"1","article-title":"How to detect a compromised SDN switch","author":"chi","year":"2015","journal-title":"Proc 1st IEEE Conf Netw Softw (NetSoft)"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23283"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23064"},{"key":"ref16","first-page":"1","article-title":"Poster: Denial-of-service attack using host location hijacking in software-defined network","author":"sim","year":"2016","journal-title":"Proc 1st IEEE Eur Symp Security Privacy (Euro S&P)"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/NFV-SDN.2017.8169846"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/NFV-SDN.2016.7919488"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2017.8057041"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3168"},{"journal-title":"Service Function Chaining Use Cases In Data Centers","year":"2017","author":"kumar","key":"ref4"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2619239.2626323"},{"journal-title":"Service Function Chaining Use Cases in Mobile Networks","year":"2019","author":"haeffner","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2477041"},{"journal-title":"XOR Cipher","year":"2009","key":"ref29"},{"journal-title":"Service Function Chaining Use Cases for Network Security","year":"2017","author":"wang","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2330903"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2859449"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2016.1600219RP"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2371999"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC7665"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.23919\/INM.2017.7987331"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2019.05.015"},{"journal-title":"Proof of transist","year":"2019","author":"brockners","key":"ref21"},{"journal-title":"Service function chaining general use cases","year":"2014","author":"liu","key":"ref42"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/NETSOFT.2017.8004230"},{"article-title":"Recommendation for key management, part 1: General (Revision 4)","year":"2016","author":"barker","key":"ref41"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICUFN.2017.7993906"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2079296.2079326"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/NFV-SDN.2017.8169861"}],"container-title":["IEEE Transactions on Network and Service Management"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4275028\/9530845\/09432797.pdf?arnumber=9432797","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T14:52:50Z","timestamp":1652194370000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9432797\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9]]},"references-count":42,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tnsm.2021.3081014","relation":{},"ISSN":["1932-4537","2373-7379"],"issn-type":[{"type":"electronic","value":"1932-4537"},{"type":"electronic","value":"2373-7379"}],"subject":[],"published":{"date-parts":[[2021,9]]}}}