{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:34:33Z","timestamp":1725496473022},"publisher-location":"Berlin, Heidelberg","reference-count":7,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540726050"},{"type":"electronic","value":"9783540726067"}],"license":[{"start":{"date-parts":[[2007,1,1]],"date-time":"2007-01-01T00:00:00Z","timestamp":1167609600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-72606-7_98","type":"book-chapter","created":{"date-parts":[[2007,11,26]],"date-time":"2007-11-26T16:02:47Z","timestamp":1196092967000},"page":"1136-1139","source":"Crossref","is-referenced-by-count":1,"title":["Capacity-Fairness Performance of an Ad Hoc IEEE 802.11 WLAN with Noncooperative Stations"],"prefix":"10.1007","author":[{"given":"Jerzy","family":"Konorski","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"98_CR1","unstructured":"Bellardo, J., Savage, S.: 802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions. In: Proc. USENIX Security Symp., Washington DC (2003)"},{"key":"98_CR2","doi-asserted-by":"publisher","first-page":"535","DOI":"10.1109\/49.840210","volume":"18","author":"G. Bianchi","year":"2000","unstructured":"Bianchi, G.: Performance Analysis of the IEEE 802.11 Distributed Coordination Function. IEEE J. on Selected Areas in Comm.\u00a018, 535\u2013547 (2000)","journal-title":"IEEE J. on Selected Areas in Comm."},{"key":"98_CR3","volume-title":"Proc. IEEE INFOCOM 2005, Miami, FL","author":"M. Cagalj","year":"2005","unstructured":"Cagalj, M., et al.: On Cheating in CSMA\/CA Ad Hoc Networks. In: Proc. IEEE INFOCOM 2005, Miami, FL, IEEE Computer Society Press, Los Alamitos (2005)"},{"key":"98_CR4","volume-title":"Game Theory","author":"D. Fudenberg","year":"1991","unstructured":"Fudenberg, D., Tirole, J.: Game Theory. MIT Press, Cambridge (1991)"},{"key":"98_CR5","unstructured":"IEEE Standard for Information Technology: LAN\/MAN - Specific Requirements, ISO\/IEC 8802-11 (1999)"},{"key":"98_CR6","unstructured":"Jain, R.: Fairness: How to Measure Quantitatively? ATM Forum\/94-0881 (1994)"},{"key":"98_CR7","doi-asserted-by":"publisher","first-page":"1167","DOI":"10.1109\/TNET.2006.886298","volume":"14","author":"J. Konorski","year":"2006","unstructured":"Konorski, J.: A Game-Theoretic Study of CSMA\/CA Under a Backoff Attack. IEEE\/ACM Trans. on Networking\u00a014, 1167\u20131178 (2006)","journal-title":"IEEE\/ACM Trans. on Networking"}],"container-title":["Lecture Notes in Computer Science","NETWORKING 2007. Ad Hoc and Sensor Networks, Wireless Networks, Next Generation Internet"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-72606-7_98","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,25]],"date-time":"2019-02-25T17:59:06Z","timestamp":1551117546000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-72606-7_98"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540726050","9783540726067"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-72606-7_98","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2007]]}}}