{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T06:49:08Z","timestamp":1769064548362,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540308034","type":"print"},{"value":"9783540322962","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11596042_44","type":"book-chapter","created":{"date-parts":[[2005,11,24]],"date-time":"2005-11-24T15:14:40Z","timestamp":1132845280000},"page":"423-432","source":"Crossref","is-referenced-by-count":6,"title":["Security Analysis of Michael: The IEEE 802.11i Message Integrity Code"],"prefix":"10.1007","author":[{"given":"Jianyong","family":"Huang","sequence":"first","affiliation":[]},{"given":"Jennifer","family":"Seberry","sequence":"additional","affiliation":[]},{"given":"Willy","family":"Susilo","sequence":"additional","affiliation":[]},{"given":"Martin","family":"Bunder","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"44_CR1","unstructured":"Information Technology - Telecommunications and Information Exchange Between Systems - Local and Metropolitan Area Networks - Specific Requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications Amendment 6: Medium Access Control (MAC) Security Enhancements, July 23 (2004)"},{"key":"44_CR2","unstructured":"Advanced Encryption Standard. National Institute of Standards and Technology, NIST FIPS PUB 197, U.S. Department of Commerce (November 2001)"},{"key":"44_CR3","unstructured":"ANSI\/IEEE Std 802.11, Edition. Information technology - Telecommunications and information exchange between systems - Local and metropolitan area networks - Specific requirements - Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications (1999)"},{"key":"44_CR4","doi-asserted-by":"crossref","unstructured":"Arbaugh, W., Shankar, N., Wan, Y.C.: Your 802.11 Wireless Network has No Clothes. In: Proceedings of IEEE International Conference on Wireless LANs and Home Networks, Singapore, pp. 131\u2013144 (2001)","DOI":"10.1142\/9789812799562_0013"},{"key":"44_CR5","doi-asserted-by":"crossref","unstructured":"Borisov, N., Goldberg, I., Wagner, D.: Intercepting Mobile Communications: The Insecurity of 802.11. In: Proceedings of the 7th Annual Internaltional Conference on Mobile Computing and Networking, Rome, Italy, pp. 180\u2013189 (2001)","DOI":"10.1145\/381677.381695"},{"key":"44_CR6","unstructured":"Ferguson, N.: Michael: an improved MIC for 802.11 WEP. IEEE 802.11 doc 02-020r0, January 17 (2002), http:\/\/grouper.ieee.org\/groups\/802\/11\/Documents\/DocumentHolder\/2-020.zip"},{"key":"44_CR7","doi-asserted-by":"crossref","unstructured":"Fluhrer, S., Mantin, I., Shamir, A.: Weaknesses in the Key Scheduling Algorithm of RC4. In: Proceedings of the 8th Annual International Workshop on Selected Areas in Cryptography, Toronto, Canada, pp. 1\u201324 (2001)","DOI":"10.1007\/3-540-45537-X_1"},{"key":"44_CR8","unstructured":"Rivest, R.: The RC4 Encryption Algorithm, RSA Data Security Inc. (Proprietary) (March 1992)"},{"key":"44_CR9","unstructured":"Stubblefield, A., Ioannidis, J., Rubin, A.: Using the Fluhrer, Mantin, and Shamir Attack to Break WEP. In: Proceedings of the 2002 Network and Distributed Systems Security Symposium, San Diego, California, pp. 17\u201322 (2002)"},{"key":"44_CR10","doi-asserted-by":"crossref","unstructured":"Wool, A.: A Note on the Fragility of the \u201cMichael\u201d Message Integrity Code. IEEE Transactions on Wireless Communications (2004)","DOI":"10.1109\/TWC.2004.833470"}],"container-title":["Lecture Notes in Computer Science","Embedded and Ubiquitous Computing \u2013 EUC 2005 Workshops"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11596042_44.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T06:53:56Z","timestamp":1619506436000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11596042_44"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540308034","9783540322962"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/11596042_44","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2005]]}}}