{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T01:50:29Z","timestamp":1776304229161,"version":"3.50.1"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030688837","type":"print"},{"value":"9783030688844","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-68884-4_45","type":"book-chapter","created":{"date-parts":[[2021,2,8]],"date-time":"2021-02-08T23:29:09Z","timestamp":1612826949000},"page":"545-556","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Simultaneous Deauthentication of Equals Attack"],"prefix":"10.1007","author":[{"given":"Stephan","family":"Marais","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9157-3079","authenticated-orcid":false,"given":"Marijke","family":"Coetzee","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5866-8335","authenticated-orcid":false,"given":"Franz","family":"Blauw","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,2,7]]},"reference":[{"key":"45_CR1","unstructured":"WiFi-Alliance: \u201cWPA3 Specification,\u201d Wi-Fi Alliance (2018). https:\/\/www.wi-fi.org\/download.php?file=\/sites\/default\/files\/private\/WPA3_Specification_v1.0.pdf, Accessed 20 June 2018"},{"key":"45_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"559","DOI":"10.1007\/978-3-662-53140-2_27","volume-title":"Cryptographic Hardware and Embedded Systems \u2013 CHES 2016","author":"M Kammerstetter","year":"2016","unstructured":"Kammerstetter, M., Muellner, M., Burian, D., Kudera, C., Kastner, W.: Efficient high-speed WPA2 brute force attacks using scalable low-cost FPGA clustering. In: Gierlichs, B., Poschmann, A.Y. (eds.) CHES 2016. LNCS, vol. 9813, pp. 559\u2013577. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-53140-2_27"},{"key":"45_CR3","unstructured":"Wi-Fi Alliance: \u201cWi-Fi Protected Access: Strong, standards-based, interoperable security for today\u2019s Wi-Fi networks [White Paper]\u201d (2003). https:\/\/www.cs.kau.se\/cs\/education\/courses\/dvad02\/p1\/PapersWireless\/Wi-FiProtectedAccess-Whitepaper.pdf, Accessed 08 Aug 2020"},{"key":"45_CR4","doi-asserted-by":"crossref","unstructured":"Vanhoef, M., Ronen, E.: \u201cDragonblood: analyzing the dragonfly handshake of WPA3 and EAP-pwd. In: IEEE Symposium on Security and Privacy-S&P, pp. 517\u2013533 (2020)","DOI":"10.1109\/SP40000.2020.00031"},{"issue":"11","key":"45_CR5","doi-asserted-by":"publisher","first-page":"284","DOI":"10.3390\/electronics7110284","volume":"7","author":"CP Kohlios","year":"2018","unstructured":"Kohlios, C.P., Hayajneh, T.: A comprehensive attack flow model and security analysis for Wi-Fi and WPA3. Electronics 7(11), 284 (2018). https:\/\/doi.org\/10.3390\/electronics7110284","journal-title":"Electronics"},{"key":"45_CR6","doi-asserted-by":"publisher","unstructured":"Lounis, K., Zulkernine, M.: Bad-token: denial of service attacks on WPA3. In: ACM International Conference Proceeding Series, pp. 1\u20138 (2019). https:\/\/doi.org\/10.1145\/3357613.3357629.","DOI":"10.1145\/3357613.3357629"},{"key":"45_CR7","doi-asserted-by":"publisher","unstructured":"Ahmad, M.S., Tadakamadla, S.:Short paper: security evaluation of IEEE 802.11w specification. In: WiSec 2011 - Proceedings of the 4th ACM Conference on Wireless Network Security, pp. 53\u201358 (2011). https:\/\/doi.org\/10.1145\/1998412.1998424.","DOI":"10.1145\/1998412.1998424"},{"key":"45_CR8","unstructured":"Tschacher, N.P.: Model based fuzzing of the WPA3 Dragonfly handshake (2019). https:\/\/sar.informatik.hu-berlin.de\/research\/publications\/SAR-PR-2020-01\/SAR-PR-2020-01_.pdf, Accessed 15 Jan 2020"},{"issue":"6","key":"45_CR9","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1109\/MSP.2004.111","volume":"2","author":"B Chess","year":"2004","unstructured":"Chess, B., Mcgraw, G.: Static analysis for security. IEEE Secur. Priv. 2(6), 76\u201379 (2004)","journal-title":"IEEE Secur. Priv."},{"issue":"1","key":"45_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s42400-018-0002-y","volume":"1","author":"J Li","year":"2018","unstructured":"Li, J., Zhao, B., Zhang, C.: Fuzzing: a survey. Cybersecurity 1(1), 1\u20133 (2018). https:\/\/doi.org\/10.1186\/s42400-018-0002-y","journal-title":"Cybersecurity"},{"issue":"1","key":"45_CR11","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/s11416-007-0065-x","volume":"4","author":"L Butti","year":"2008","unstructured":"Butti, L., Tinn\u00e9s, J.: Discovering and exploiting 802.11 wireless driver vulnerabilities. J. Comput. Virol. 4(1), 25\u201337 (2008). https:\/\/doi.org\/10.1007\/s11416-007-0065-x","journal-title":"J. Comput. Virol."},{"key":"45_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1007\/11836810_25","volume-title":"Information Security","author":"G Banks","year":"2006","unstructured":"Banks, G., Cova, M., Felmetsger, V., Almeroth, K., Kemmerer, R., Vigna, G.: SNOOZE: toward a stateful network protocol fuzzer. In: Katsikas, S.K., L\u00f3pez, J., Backes, M., Gritzalis, S., Preneel, B. (eds.) ISC 2006. LNCS, vol. 4176, pp. 343\u2013358. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11836810_25"},{"key":"45_CR13","unstructured":"Marais, S.: WPA3Fuzz (2020). https:\/\/github.com\/stephan-marais\/WPA3Fuzz, Accessed 10 Aug 2020"},{"key":"45_CR14","unstructured":"Holtmann, M.: hwsim (2019). https:\/\/www.mankier.com\/1\/hwsim, Accessed 01 June 2019"},{"key":"45_CR15","unstructured":"Malinen, J.: hostapd: IEEE 802.11 AP, IEEE 802.1X\/WPA\/WPA2\/EAP\/RADIUS Authenticator (2013). https:\/\/w1.fi\/hostapd\/, Accessed 01 June 2019"},{"key":"45_CR16","unstructured":"Malinen, J.: Linux WPA\/WPA2\/IEEE 802.1X Supplicant (2013). https:\/\/w1.fi\/wpa_supplicant\/, Accessed 01 June 2019"},{"key":"45_CR17","unstructured":"Malinen, J.: AP mode PMF disconnection protection bypass (2019). https:\/\/w1.fi\/security\/2019-7\/ap-mode-pmf-disconnection-protection-bypass.txt, Accessed 01 Mar 2020"},{"key":"45_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"511","DOI":"10.1007\/978-3-030-05345-1_44","volume-title":"Security, Privacy, and Anonymity in Computation, Communication, and Storage","author":"MZA Bhuiyan","year":"2018","unstructured":"Bhuiyan, M.Z.A., Islam, M.M., Wang, G., Wang, T.: Investigation on unauthorized human activity watching through leveraging wi-fi signals. In: Wang, G., Chen, J., Yang, L.T. (eds.) SpaCCS 2018. LNCS, vol. 11342, pp. 511\u2013521. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-05345-1_44"}],"container-title":["Lecture Notes in Computer Science","Security, Privacy, and Anonymity in Computation, Communication, and Storage"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-68884-4_45","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,2,8]],"date-time":"2021-02-08T23:53:47Z","timestamp":1612828427000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-68884-4_45"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030688837","9783030688844"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-68884-4_45","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"7 February 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SpaCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nanjing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 December 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 December 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"spaccs2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.spaccs2020.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"131","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"48","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"37% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}