{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T16:23:24Z","timestamp":1774023804960,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540219590","type":"print"},{"value":"9783540246930","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24693-0_65","type":"book-chapter","created":{"date-parts":[[2010,9,11]],"date-time":"2010-09-11T02:02:45Z","timestamp":1284170565000},"page":"795-806","source":"Crossref","is-referenced-by-count":16,"title":["Detecting and Blocking Unauthorized Access in Wi-Fi Networks"],"prefix":"10.1007","author":[{"given":"Haidong","family":"Xia","sequence":"first","affiliation":[]},{"given":"Jos\u00e9","family":"Brustoloni","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"65_CR1","unstructured":"IEEE: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. 802.11 Std. (1999) [Online] \n                    http:\/\/standards.ieee.org\n                    \n                  \/getieee802\/download\/802.11\u20131999.pdf"},{"key":"65_CR2","unstructured":"Wi-Fi Alliance: [Online] \n                    http:\/\/www.weca.net"},{"key":"65_CR3","volume-title":"Report Profiles Growth in Wi-Fi IC Shipments","author":"K Mackie","year":"2002","unstructured":"Mackie, K.: Report Profiles Growth in Wi-Fi IC Shipments. Broadband Wireless Online, Dec. 19 (2002) [Online] \n                    http:\/\/www.shorecliffcommunications.com\n                    \n                  \/magazine\/news.asp?news=1105"},{"key":"65_CR4","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1145\/381677.381695","volume-title":"Proc. Seventh Annual International Conference on Mobile Computing and Networking","author":"N Borisov","year":"2001","unstructured":"Borisov, N., Goldberg, L, Wagner, D.: Intercepting Mobile Communications: The Insecurity of 802.11. In: Proc. Seventh Annual International Conference on Mobile Computing and Networking (MOBICOM), ACM (2001) 180\u2013188"},{"key":"65_CR5","volume-title":"Eighth Annual Workshop on Selected Areas in Cryptography","author":"S Fluhrer","year":"2001","unstructured":"Fluhrer, S., Mantin, I., Shamir, A.: Weaknesses in the Key Scheduling Algorithm of RC4. In: Eighth Annual Workshop on Selected Areas in Cryptography. (2001)"},{"key":"65_CR6","volume-title":"Using the Fluhrer, Mantin, and Shamir Attack to Break WEP","author":"A Stubblefield","year":"2001","unstructured":"Stubblefield, A., Ioannidis, J., Rubin, A.: Using the Fluhrer, Mantin, and Shamir Attack to Break WEP. Technical Report TD-4ZCPZZ, AT&T Labs (2001)"},{"key":"65_CR7","volume-title":"Proc. First IEEE International Conference on Wireless LANs and Home Networks","author":"W Arbaugh","year":"2001","unstructured":"Arbaugh, W., Shankar, N., Wang, J.: Your 802.11 Network Has No Clothes. In: Proc. First IEEE International Conference on Wireless LANs and Home Networks. (2001)"},{"key":"65_CR8","volume-title":"An Initial Security Analysis of the IEEE 802.IX Standard","author":"A Mishra","year":"2002","unstructured":"Mishra, A., Arbaugh, W.: An Initial Security Analysis of the IEEE 802.IX Standard. Technical Report CS-TR-4328, University of Maryland (2002)"},{"key":"65_CR9","volume-title":"Security Architecture for the Internet Protocol","author":"S Kent","year":"1998","unstructured":"Kent, S., Atkinson, R.: Security Architecture for the Internet Protocol. IETF, RFC 2401 (1998) [Online] ftp:\/\/ftp.rfc-editor.org\/in-notes\/rfc2401.txt"},{"key":"65_CR10","unstructured":"Freier, A., Karlton, P., Kocher, P.: The SSL Protocol Version 3.0. [Online] \n                    http:\/\/wp.netscape.com\n                    \n                  \/eng\/ssl3\/draft302.txt"},{"key":"65_CR11","volume-title":"Security: Open Networks Pose Dilemma","author":"R Lemos","year":"2003","unstructured":"Lemos, R.: Security: Open Networks Pose Dilemma. In: news.com, Feb. 5 (2003) [Online] http : \/\/news.com.com\/2009\u20131033\u2013982324 html?tag=rn"},{"key":"65_CR12","unstructured":"IEEE: Specification for Enhanced Security, (unapproved draft for 802.11i) [Online] \n                    http:\/\/standards.ieee.org\n                    \n                  \/getieee802\/new.html"},{"key":"65_CR13","first-page":"699","volume-title":"Proc. INFOCOM, IEEE","author":"G Appenzeller","year":"1999","unstructured":"Appenzeller, G., Roussopoulos, M., Baker, M.: User-Friendly Access Control for Public Network Ports. In: Proc. INFOCOM, IEEE, Mar. (1999) 699\u2013707 [Online] \n                    http:\/\/mosquitonet.stanford.edu\n                    \n                  \/publications\/WebSpinach.ps"},{"key":"65_CR14","first-page":"789","volume-title":"Computer Networks","author":"J Brustoloni","year":"2000","unstructured":"Brustoloni, J., Garay, J.: MicroISPs: Providing Convenient and Low-Cost High-Bandwidth Internet Access. In: Computer Networks 33 (2000) 789\u2013802 [Online] \n                    http:\/\/www9.org\n                    \n                  \/w9cdrom\/249\/249.html"},{"key":"65_CR15","volume-title":"Proc. ICC, IEEE","author":"P Bahl","year":"2001","unstructured":"Bahl, P., Venkatachary, S., Balachandran, A.: Secure Wireless Internet Access in Public Places. In: Proc. ICC, IEEE, June (2001) [Online] \n                    http:\/\/www.cs.ucsd.edu\n                    \n                  \/users\/abalacha\/research\/papers\/ICC01.pdf"},{"key":"65_CR16","unstructured":"IEEE: Port-Based Network Access Control. 802.lx Std. (2001) [Online] \n                    http:\/\/standards.ieee.org\n                    \n                  \/getieee802\/download\/802.1X-2001.pdf"},{"key":"65_CR17","doi-asserted-by":"crossref","DOI":"10.6028\/NIST.SP.800-48","volume-title":"Wireless Network Security \u2014 802.11, Bluetooth and Handheld Devices","author":"T Karygiannis","year":"2002","unstructured":"Karygiannis, T., Owens, L.: Wireless Network Security \u2014 802.11, Bluetooth and Handheld Devices. Special Publication 800\u201348, NIST (2002) [Online] \n                    http:\/\/csrc.nist.gov\n                    \n                  \/publications\/nistpubs\/800\u201348\/NIST_SP_800\u201348.pdf"}],"container-title":["Lecture Notes in Computer Science","NETWORKING 2004. Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24693-0_65.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T03:04:04Z","timestamp":1620011044000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24693-0_65"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540219590","9783540246930"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24693-0_65","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2004]]}}}