{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T13:46:59Z","timestamp":1725544019273},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540341666"},{"type":"electronic","value":"9783540341680"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11753728_62","type":"book-chapter","created":{"date-parts":[[2006,4,27]],"date-time":"2006-04-27T20:17:13Z","timestamp":1146169033000},"page":"619-628","source":"Crossref","is-referenced-by-count":1,"title":["Authentication Mechanism Using One-Time Password for 802.11 Wireless LAN"],"prefix":"10.1007","author":[{"given":"Binod","family":"Vaidya","sequence":"first","affiliation":[]},{"given":"SangDuck","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Jae-Kyun","family":"Han","sequence":"additional","affiliation":[]},{"given":"SeungJo","family":"Han","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"62_CR1","unstructured":"Institute of Electrical and Electronics Engineers: Information technology - Telecommunications and information exchange between systems - Local and metropolitan area networks - Specific Requirements Part 11 - Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, IEEE Standard 802.11-2003 (2003)"},{"key":"62_CR2","volume-title":"802.11 Wireless Networks - The Definitive Guide","author":"M. Gast","year":"2002","unstructured":"Gast, M.: 802.11 Wireless Networks - The Definitive Guide, December 2002. O\u2019Reilly, Sebastopol (2002)"},{"key":"62_CR3","volume-title":"802.11 Security","author":"B. Potter","year":"2002","unstructured":"Potter, B., Fleck, B.: 802.11 Security, December 2002. O\u2019Reilly, Sebastopol (2002)"},{"key":"62_CR4","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1109\/MWC.2002.1160080","volume":"9","author":"W.A. Arbaugh","year":"2002","unstructured":"Arbaugh, W.A., Shankar, N., Justin Wan, Y.C.: Your 802.11 wireless network has no clothes. IEEE Wireless Communications\u00a09, 44\u201351 (2002)","journal-title":"IEEE Wireless Communications"},{"key":"62_CR5","unstructured":"Walker, J.R.: Unsafe at any key size - an analysis of the WEP encapsulation, 802.11 Security Papers at NetSys.com (October 2000), http:\/\/www.netsys.com\/library\/papers\/walker-2000-10-27.pdf"},{"key":"62_CR6","volume-title":"Real 802.11 Security - Wi-Fi Protected Access and 802.11i","author":"J. Edney","year":"2003","unstructured":"Edney, J., Arbaugh, W.A.: Real 802.11 Security - Wi-Fi Protected Access and 802.11i, July 2003. Addison-Wesley, Reading (2003)"},{"key":"62_CR7","unstructured":"Cox, P.: Robust Security Network - The future of wireless security, System Experts Corporation, http:\/\/www.systemexperts.com\/win2k\/SecureWorldExpo-RSN.ppt"},{"key":"62_CR8","unstructured":"Baek, K.H., Smith, S.W., Kotz, D.: A Survey of WPA and 802.11i RSN Authentication Protocols, Dartmouth College Computer Science, Technical Report TR2004-524 (November 2004)"},{"key":"62_CR9","doi-asserted-by":"crossref","unstructured":"Haller, N., Metz, C., Nesser, P., Straw, M.: A One-Time Password System, IETF RFC 2289 (February 1998)","DOI":"10.17487\/rfc2289"},{"issue":"11","key":"62_CR10","doi-asserted-by":"publisher","first-page":"722","DOI":"10.1145\/358790.358797","volume":"24","author":"L. Lamport","year":"1981","unstructured":"Lamport, L.: Password Authentication with insecure communication. Communications of the ACM\u00a024(11), 722\u2013770 (1981)","journal-title":"Communications of the ACM"},{"key":"62_CR11","doi-asserted-by":"crossref","unstructured":"Aboba, B., Blunk, L., Vollbrecht, J., Carlson, J., Levkowetz, H.: Extensible Authentication Protocol (EAP), IETF RFC 3748 (June 2004)","DOI":"10.17487\/rfc3748"},{"key":"62_CR12","doi-asserted-by":"crossref","unstructured":"Haller, N.: The S\/KEY One-Time Password System. In: Proc. of the Symposium on Network and Distributed Systems Security, Internet Society, CA, USA (February 1994)","DOI":"10.17487\/rfc1760"},{"key":"62_CR13","unstructured":"Blunk, L., Vollbrecht, J., Aboba, B.: The One Time Password (OTP) and Generic Token Card Authentication Protocols, Internet draft <draft-ietf-eap-otp-00.txt>"},{"key":"62_CR14","unstructured":"OPNET Modeler Simulation Software, http:\/\/www.opnet.com"},{"issue":"1","key":"62_CR15","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1145\/77648.77649","volume":"8","author":"M. Burrows","year":"1990","unstructured":"Burrows, M., Abadi, M., Needham, R.: A logic of authentication. ACM Transactions on Computer Systems\u00a08(1), 18\u201336 (1990)","journal-title":"ACM Transactions on Computer Systems"},{"key":"62_CR16","doi-asserted-by":"crossref","unstructured":"Abadi, M., Tuttle, M.: A semantics for a logic of authentication. In: Proc. of the Tenth Annual ACM Symposium on Principles of Distributed Computing, August 1991, pp. 201\u2013216 (1991)","DOI":"10.1145\/112600.112618"}],"container-title":["Lecture Notes in Computer Science","Computer Science \u2013 Theory and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11753728_62.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:03:52Z","timestamp":1619507032000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11753728_62"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540341666","9783540341680"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/11753728_62","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}