{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T07:21:43Z","timestamp":1725520903595},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540895237"},{"type":"electronic","value":"9783540895244"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-89524-4_62","type":"book-chapter","created":{"date-parts":[[2008,11,19]],"date-time":"2008-11-19T01:10:09Z","timestamp":1227057009000},"page":"629-638","source":"Crossref","is-referenced-by-count":2,"title":["An Efficient Proactive Key Distribution Scheme for Fast Handoff in IEEE 802.11 Wireless Networks"],"prefix":"10.1007","author":[{"given":"Junbeom","family":"Hur","sequence":"first","affiliation":[]},{"given":"Chanil","family":"Park","sequence":"additional","affiliation":[]},{"given":"Youngjoo","family":"Shin","sequence":"additional","affiliation":[]},{"given":"Hyunsoo","family":"Yoon","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"62_CR1","unstructured":"IEEE 802.11i: Amendment 6: Medium Access Control (MAC) Security Enhancements. IEEE Computer Society (July 2004)"},{"key":"62_CR2","unstructured":"IEEE 802.11f: Recommnded Practice for Multi-Vendor Access Point Interoperability via an Inter-Access Point Protocol Across Distribution Systems Supporting IEEE 802.11 Operatoin. IEEE (July 2003)"},{"key":"62_CR3","unstructured":"IEEE 802.1x: IEEE Standards for Local and Metropolitan Area Networks: Port based Network Access Control. IEEE (June 2001)"},{"key":"62_CR4","doi-asserted-by":"crossref","unstructured":"Aboba, B., Simon, D.: PPP EAP TLS Authenticatoin Protocol. RFC 2716 (October 1999)","DOI":"10.17487\/rfc2716"},{"key":"62_CR5","doi-asserted-by":"crossref","unstructured":"Mishra, A., Shin, M., Arbaugh, W.A.: Pro-active Key Distribution using Neighbor Graphs. IEEE Wireless Communications\u00a011 (February 2004)","DOI":"10.1109\/MWC.2004.1269714"},{"key":"62_CR6","doi-asserted-by":"crossref","unstructured":"Pack, S., Jung, H., Kwon, T., Choi, Y.: SNC: A Selective Neighbor Caching Scheme for Fast Handoff in IEEE 802.11 Wireless Networks. ACM SIGMOBILE Mobile Computing and Communications Review (October 2005)","DOI":"10.1145\/1096166.1096172"},{"key":"62_CR7","doi-asserted-by":"crossref","unstructured":"Kassab, M., Belghith, A., Bonnin, J., Sassi, S.: Fast Pre-Authentication Based on Proacitve Key Distribution for 802.11 Infrastructure Networks. In: ACM Workshop on Wireless Multimedia Networking and Performance Modeling (WMuNeP 2005), October 13 (2005)","DOI":"10.1145\/1089737.1089746"},{"key":"62_CR8","unstructured":"International Telecommunication Union: General Characteristics of International Telephone Connections and International Telephone Circuits. ITU-TG.114 (1988)"},{"key":"62_CR9","unstructured":"Aboba, B.: Fast Handoff Issues. IEEE 802.11-03\/155r0 (2003)"},{"key":"62_CR10","doi-asserted-by":"crossref","unstructured":"He, C., Mitchell, J.C.: Analysis of the 802.11i 4-Way Handshake. In: ACM Workshop on Wireless Security (WiSe 2004) (October 2004)","DOI":"10.1145\/1023646.1023655"},{"issue":"1","key":"62_CR11","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1145\/77648.77649","volume":"8","author":"M. Burrows","year":"1990","unstructured":"Burrows, M., Abadi, M., Needham, R.: A Logic of Authentication. ACM Transactions on Computer Systems\u00a08(1), 18\u201336 (1990)","journal-title":"ACM Transactions on Computer Systems"}],"container-title":["Lecture Notes in Computer Science","Information Networking. Towards Ubiquitous Networking and Services"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-89524-4_62","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,15]],"date-time":"2019-05-15T11:05:43Z","timestamp":1557918343000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-89524-4_62"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540895237","9783540895244"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-89524-4_62","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}