{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T04:59:47Z","timestamp":1725771587723},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,10]]},"DOI":"10.1109\/milcom.2014.49","type":"proceedings-article","created":{"date-parts":[[2014,11,26]],"date-time":"2014-11-26T15:30:46Z","timestamp":1417015846000},"page":"268-273","source":"Crossref","is-referenced-by-count":2,"title":["Untraceable Blind Packet Forwarding Using Centralized Path Control"],"prefix":"10.1109","author":[{"given":"Youngmi","family":"Lee","sequence":"first","affiliation":[]},{"given":"Younggi","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Younghee","family":"Lee","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"17"},{"year":"0","key":"15"},{"journal-title":"Open Vswitch","year":"0","key":"16"},{"journal-title":"The pairing-based cryptography library","year":"0","author":"lynn","key":"13"},{"journal-title":"Mininet","year":"0","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/2491185.2491187"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2004.1348084"},{"key":"3","first-page":"506","article-title":"Public key encryption with keyword search","author":"boneh","year":"2004","journal-title":"Advances in Cryptology-Eurocrypt"},{"journal-title":"Public Key Encryption with Keyword Search for Restricted Testability","year":"2012","author":"eun eom","key":"2"},{"key":"1","article-title":"A clean-slate security vision for future networks","author":"simsek","year":"2013","journal-title":"Network of the Future (NOF)"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/2491185.2491193"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2009.11.726"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/CSE.2009.66"},{"key":"5","first-page":"282","article-title":"Public key encryption with searchable keywords based on Jacobi symbols","author":"di crescenzo","year":"2007","journal-title":"Progress in Cryptology-INDOCRYPT India 4859 of LNCS"},{"key":"4","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1007\/978-3-540-73489-5_2","article-title":"Public key encryption with conjunctive keyword search and its extension to a multi-user system","author":"hwang","year":"2007","journal-title":"Proc of Pairing-Based Cryptography-Pairing"},{"key":"9","doi-asserted-by":"crossref","DOI":"10.1109\/SURV.2014.012214.00180","article-title":"A survey of software-defined networking","author":"nunes","year":"2014","journal-title":"Communications Surveys & Tutorials IEEE"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2010.07.007"}],"event":{"name":"2014 IEEE Military Communications Conference (MILCOM)","start":{"date-parts":[[2014,10,6]]},"location":"Baltimore, MD, USA","end":{"date-parts":[[2014,10,8]]}},"container-title":["2014 IEEE Military Communications Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6954705\/6956719\/06956770.pdf?arnumber=6956770","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T01:00:00Z","timestamp":1498179600000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6956770\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,10]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/milcom.2014.49","relation":{},"subject":[],"published":{"date-parts":[[2014,10]]}}}