{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T16:58:57Z","timestamp":1725469137564},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540380917"},{"type":"electronic","value":"9783540380924"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11833529_92","type":"book-chapter","created":{"date-parts":[[2006,8,25]],"date-time":"2006-08-25T15:33:11Z","timestamp":1156519991000},"page":"902-911","source":"Crossref","is-referenced-by-count":0,"title":["Investigating Authentication Mechanisms for Wireless Mobile Network"],"prefix":"10.1007","author":[{"given":"Binod","family":"Vaidya","sequence":"first","affiliation":[]},{"given":"YoungJin","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Eung-Kon","family":"Kim","sequence":"additional","affiliation":[]},{"given":"SeungJo","family":"Han","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"92_CR1","unstructured":"Institute of Electrical and Electronics Engineers: Information technology - Telecommunications and information exchange between systems - Local and metropolitan area networks - Specific Requirements Part 11 - Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, IEEE Standard 802.11-2003 (2003)"},{"key":"92_CR2","unstructured":"IEEE Standards for Local and Metropolitan Area Networks: Port based Network Access Control, IEEE Std 802.1X-2004 (December 2004)"},{"key":"92_CR3","doi-asserted-by":"crossref","unstructured":"Aboba, B., Blunk, L., Vollbrecht, J., Carlson, J., Levkowetz, H.: Extensible Authentication Protocol (EAP), IETF RFC 3748 (June 2004)","DOI":"10.17487\/rfc3748"},{"key":"92_CR4","unstructured":"IEEE P802.11i\/D10.0. Medium Access Control (MAC) Security Enhancements, Amendment 6 to IEEE Standard for Information technology - Telecommunications and information ex-change between systems - Local and metropolitan area networks - Specific requirements Part 11: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications (April 2004)"},{"key":"92_CR5","doi-asserted-by":"crossref","unstructured":"Aboba, B., Simon, D.: PPP EAP TLS Authentication Protocol, IETF RFC 2716 (October 1999)","DOI":"10.17487\/rfc2716"},{"key":"92_CR6","volume-title":"802. 11 Wireless Networks - The Definitive Guide","author":"M. Gast","year":"2002","unstructured":"Gast, M.: 802. 11 Wireless Networks - The Definitive Guide. O\u2019Reilly, Sebastopol (2002)"},{"key":"92_CR7","unstructured":"Baek, K.H., Smith, S.W., Kotz, D.: A Survey of WPA and 802.11i RSN Authentication Protocols, Dartmouth College Computer Science, Technical Report TR2004-524 (November 2004)"},{"key":"92_CR8","volume-title":"802. 11 Security","author":"B. Potter","year":"2002","unstructured":"Potter, B., Fleck, B.: 802. 11 Security. O\u2019Reilly, Sebastopol (2002)"},{"key":"92_CR9","volume-title":"Real 802.11 Security - Wi-Fi Protected Access and 802.11i","author":"J. Edney","year":"2003","unstructured":"Edney, J., Arbaugh, W.A.: Real 802.11 Security - Wi-Fi Protected Access and 802.11i. Addison-Wesley, Reading (2003)"},{"issue":"11","key":"92_CR10","doi-asserted-by":"publisher","first-page":"722","DOI":"10.1145\/358790.358797","volume":"24","author":"L. Lamport","year":"1981","unstructured":"Lamport, L.: Password Authentication with insecure communication. Communications of the ACM\u00a024(11), 722\u2013770 (1981)","journal-title":"Communications of the ACM"},{"key":"92_CR11","doi-asserted-by":"crossref","unstructured":"Haller, N.: The S\/KEY One-Time Password System. In: Proc. of the Symposium on Network and Distributed Systems Security, Internet Society, CA, USA (February 1994)","DOI":"10.17487\/rfc1760"},{"key":"92_CR12","doi-asserted-by":"crossref","unstructured":"Haller, N., Metz, C., Nesser, P., Straw, M.: A One-Time Password System, IETF RFC 2289 (February 1998)","DOI":"10.17487\/rfc2289"},{"key":"92_CR13","unstructured":"Blunk, L., Vollbrecht, J., Aboba, B.: The One Time Password (OTP) and Generic Token Card Authentication Protocols, Internet draft <draft-ietf-eap-otp-00.txt>"},{"key":"92_CR14","unstructured":"OPNET Modeler Simulation Software, http:\/\/www.opnet.com"},{"issue":"1","key":"92_CR15","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1145\/77648.77649","volume":"8","author":"M. Burrows","year":"1990","unstructured":"Burrows, M., Abadi, M., Needham, R.: A logic of authentication. ACM Transactions on Computer Systems\u00a08(1), 18\u201336 (1990)","journal-title":"ACM Transactions on Computer Systems"},{"key":"92_CR16","doi-asserted-by":"crossref","unstructured":"Abadi, M., Tuttle, M.: A semantics for a logic of authentication. In: Proc. of the Tenth Annual ACM Symposium on Principles of Distributed Computing, pp. 201\u2013216 (August 1991)","DOI":"10.1145\/112600.112618"}],"container-title":["Lecture Notes in Computer Science","Ubiquitous Intelligence and Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11833529_92.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T20:19:14Z","timestamp":1605644354000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11833529_92"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540380917","9783540380924"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/11833529_92","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}