{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:51:26Z","timestamp":1725558686766},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540255840"},{"type":"electronic","value":"9783540319795"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/978-3-540-31979-5_3","type":"book-chapter","created":{"date-parts":[[2010,6,30]],"date-time":"2010-06-30T16:42:55Z","timestamp":1277916175000},"page":"25-35","source":"Crossref","is-referenced-by-count":3,"title":["Modeling and Evaluation of Security Architecture for Wireless Local Area Networks by Indexing Method: A Novel Approach"],"prefix":"10.1007","author":[{"given":"Debabrata","family":"Nayak","sequence":"first","affiliation":[]},{"given":"D. B.","family":"Phatak","sequence":"additional","affiliation":[]},{"given":"V. P.","family":"Gulati","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","series-title":"Telecom International","first-page":"823","volume-title":"Wireless security","author":"R.K. Nichols","year":"2002","unstructured":"Nichols, R.K.: Wireless security, 2nd edn. Telecom International, 823 pages. McGraw-Hill, New York (2002)","edition":"2"},{"key":"3_CR2","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1109\/CSAC.1997.646180","volume-title":"proceedings of the 13th Annual computer security Applications Conference","author":"B. Askwith","year":"1997","unstructured":"Askwith, B., Merabti, M., shi, Q., whiteley, K.: Achieving User privacy in Mo-bile Networks. In: proceedings of the 13th Annual computer security Applications Conference, pp. 108\u2013116. IEEE, Los Alamitos (1997)"},{"key":"3_CR3","first-page":"12","volume":"13","author":"M. Moyer","year":"1999","unstructured":"Moyer, M.: A survey of security Issues in Multicast Communication. IEEE transaction on computer networking\u00a013, 12\u201323 (1999)","journal-title":"IEEE transaction on computer networking"},{"key":"3_CR4","volume-title":"Internet Cryptography","author":"R.E. Smith","year":"1999","unstructured":"Smith, R.E.: Internet Cryptography. Addison-Wesley Publishing Company, Reading (1999)"},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"Miller, S.k.: Facing challenge of the wireless security. IEEE Transaction on Computer, 16\u201318 (July 2001)","DOI":"10.1109\/2.933495"},{"key":"3_CR6","volume-title":"Proceedings of the international parallel and distributed processing symposium","author":"E. Sanchez","year":"2002","unstructured":"Sanchez, E., Edwards, R.: Optimization of the Establishment of secure communication channel in wireless Mobile Networks. In: Proceedings of the international parallel and distributed processing symposium. IEEE, Los Alamitos (2002)"},{"key":"3_CR7","first-page":"1","volume-title":"Proceedings of the 11th International workshop on database and Expert system Applications","author":"D. Thanh van","year":"2000","unstructured":"van Thanh, D.: Security issues in Mobile ecommerce. In: Proceedings of the 11th International workshop on database and Expert system Applications, pp. 1\u201314. IEEE, Los Alamitos (2000)"},{"key":"3_CR8","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1109\/ISADS.1995.398950","volume-title":"Proceedings of the second international symposium on Autonomous Decentralized systems","author":"V. bharghavan","year":"1995","unstructured":"bharghavan, V.: Security issues in mobile communication. In: Proceedings of the second international symposium on Autonomous Decentralized systems, pp. 19\u201324. IEEE, Los Alamitos (1995)"},{"key":"3_CR9","first-page":"26","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy","author":"D.A. cooper","year":"1995","unstructured":"cooper, D.A., birman, K.P.: Preserving privacy in A Network of Mobile computers. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 26\u201338. IEEE, Los Alamitos (1995)"},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"patiyoot, D., shepherd, S.j.: Cryptographic security Techniques for wireless Net-works, pp. 36\u201350. IEEE, Los Alamitos","DOI":"10.1145\/311094.311104"},{"key":"3_CR11","volume-title":"Cryptography and network Security","author":"W. stalling","year":"2000","unstructured":"stalling, W.: Cryptography and network Security, 2nd edn. Prentice Hall, Englewood Cliffs (2000)","edition":"2"},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"Ravi, S., Raghunathan, A., Potlapally, N.: Securing wireless data: system architecture Challenges. Acm journal, 195\u2013200 (October 2002)","DOI":"10.1145\/581199.581243"},{"key":"3_CR13","unstructured":"Ashley, P., Hilton, H., Vandenwauver, M.: Wired Versus Wireless Security. Internet: white paper\/2002 (2002)"},{"issue":"10","key":"3_CR14","doi-asserted-by":"publisher","first-page":"885","DOI":"10.1016\/S0140-3664(99)00064-X","volume":"22","author":"B. Harris","year":"1999","unstructured":"Harris, B., Hunt, R.: TCP\/IP security threats and attack Methods. Computer communications\u00a022(10), 885\u2013897 (1999)","journal-title":"Computer communications"},{"key":"3_CR15","doi-asserted-by":"publisher","first-page":"1107","DOI":"10.1016\/S0140-3664(98)00173-X","volume":"21","author":"R. Hunt","year":"1998","unstructured":"Hunt, R.: Internet\/Intranet firewall Security-policy, Architecture and transaction services. Computer Communications\u00a021, 1107\u20131123 (1998)","journal-title":"Computer Communications"},{"key":"3_CR16","unstructured":"JesiekB.: InternetSecurity-Firewalls, and Internet, http:\/\/www.ee.mtu.edu\/course\/ee465\/groupb\/fwll.html"},{"key":"3_CR17","series-title":"Tata","volume-title":"Network Security","author":"R.H. Baker","year":"1995","unstructured":"Baker, R.H.: Network Security, 2nd edn. Tata. McGraw Hill, New York (1995)","edition":"2"},{"key":"3_CR18","unstructured":"IEEE Standard 802.11i \/ Draft 3.0. Draft Supplement to ISO\/IEC 8802-11\/1999(I) ANSI\/IEEE Std802.11, (1999 edn.); Specification for Enhanced Security, pp. 5-6 (November 2002)"},{"key":"3_CR19","unstructured":"Rager, A.T.: WEPCrack Project Webpage. Retrieved May 9 (2003), http:\/\/sourceforge.net\/projects\/wepcrack\/"},{"key":"3_CR20","unstructured":"Mishra, A., Petroni, N.L., Payne, B.D.: Open1x \u2013 Open Source Implementation of IEEE 802.1x, June (2003), http:\/\/www.open1x.org\/"},{"key":"3_CR21","unstructured":"Convery, S., Miller, D.: SAFE: Wireless LAN Security in Depth, version 2. White paper.Cisco Systems, Inc. (2003), http:\/\/www.cisco.com\/warp\/public\/cc\/so\/cuso\/epso\/sqfr\/safwl_wp.pdf"},{"key":"3_CR22","unstructured":"Microsoft. (2002). Wireless 802.11 Security with Windows XP. Microsoft. http:\/\/www.microsoft.com\/\/windowsxp\/pro\/techinfo\/administration\/wirelesssecurity\/XP80211 Security.doc"}],"container-title":["Lecture Notes in Computer Science","Information Security Practice and Experience"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-31979-5_3.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T04:32:39Z","timestamp":1605760359000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-31979-5_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540255840","9783540319795"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-31979-5_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}