{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T12:06:05Z","timestamp":1725537965735},"publisher-location":"Berlin, Heidelberg","reference-count":8,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642047657"},{"type":"electronic","value":"9783642047664"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04766-4_9","type":"book-chapter","created":{"date-parts":[[2009,9,15]],"date-time":"2009-09-15T05:55:53Z","timestamp":1252994153000},"page":"120-132","source":"Crossref","is-referenced-by-count":8,"title":["An Improved Attack on TKIP"],"prefix":"10.1007","author":[{"given":"Finn M.","family":"Halvorsen","sequence":"first","affiliation":[]},{"given":"Olav","family":"Haugen","sequence":"additional","affiliation":[]},{"given":"Martin","family":"Eian","sequence":"additional","affiliation":[]},{"given":"Stig F.","family":"Mj\u00f8lsnes","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","first-page":"79","volume":"472","author":"M. Beck","year":"2008","unstructured":"Beck, M., Tews, E.: Practical attacks against WEP and WPA. Cryptology ePrint Archive Report\u00a0472, 79\u201386 (2008)","journal-title":"Cryptology ePrint Archive Report"},{"key":"9_CR2","unstructured":"KoreK: chopchop (Experimental WEP attacks) (2004), http:\/\/www.netstumbler.org\/f50\/chopchop-experimental-wep-attacks-12489\/"},{"key":"9_CR3","unstructured":"IEEE Standard for Information technology-Telecommunications and information exchange between systems-Local and metropolitan area networks-Specific requirements - Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. IEEE Std 802.11-2007 (Revision of IEEE Std 802.11-1999) (2007)"},{"key":"9_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-45537-X_1","volume-title":"Selected Areas in Cryptography","author":"S. Fluhrer","year":"2001","unstructured":"Fluhrer, S., Mantin, I., Shamir, A.: Weaknesses in the key scheduling algorithm. In: Vaudenay, S., Youssef, A.M. (eds.) SAC 2001. LNCS, vol.\u00a02259, pp. 1\u201324. Springer, Heidelberg (2001)"},{"key":"9_CR5","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1145\/996943.996948","volume":"7","author":"A. Stubblefield","year":"2004","unstructured":"Stubblefield, A., Ioannidis, J., Rubin, A.D.: A key recovery attack on the 802.11b wired equivalent privacy protocol (WEP). ACM Trans. Inf. Syst. Secur.\u00a07, 319\u2013332 (2004)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"9_CR6","doi-asserted-by":"crossref","unstructured":"Bittau, A., Handley, M., Lackey, J.: The Final Nail in WEP\u2019s Coffin Security and Privacy. In: IEEE Symposium on, pp.\u00a0386\u2013400 (2006)","DOI":"10.1109\/SP.2006.40"},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"Tews, E., Weinmann, R.-P., Pyshkin, A.: Breaking 104 bit WEP in less than 60 seconds. Cryptology ePrint Archive 120 (2007)","DOI":"10.1007\/978-3-540-77535-5_14"},{"key":"9_CR8","unstructured":"KoreK.: Next generation of WEP attacks (2004), http:\/\/www.netstumbler.org\/showpost.php?p=93942&postcount=35"}],"container-title":["Lecture Notes in Computer Science","Identity and Privacy in the Internet Age"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04766-4_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,22]],"date-time":"2019-05-22T11:52:57Z","timestamp":1558525977000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04766-4_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642047657","9783642047664"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04766-4_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}