{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:42:30Z","timestamp":1725550950624},"publisher-location":"Berlin, Heidelberg","reference-count":8,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642121784"},{"type":"electronic","value":"9783642121791"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-12179-1_8","type":"book-chapter","created":{"date-parts":[[2010,3,31]],"date-time":"2010-03-31T19:23:41Z","timestamp":1270063421000},"page":"72-84","source":"Crossref","is-referenced-by-count":3,"title":["Authentication \u2013 Based Medium Access Control to Prevent Protocol Jamming: A-MAC"],"prefix":"10.1007","author":[{"given":"Jaemin","family":"Jeung","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Seungmyeong","family":"Jeong","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jaesung","family":"Lim","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"8_CR1","unstructured":"http:\/\/www.kismetwireless.net"},{"key":"8_CR2","doi-asserted-by":"crossref","unstructured":"Liu, C., Yu, J.: Rogue Access Point Based DoS attacks against 802.11 WLANs. In: The Fourth AICT (2008)","DOI":"10.1109\/AICT.2008.54"},{"key":"8_CR3","first-page":"33","volume-title":"802.11 Wireless Networks: The Definitive Guide","author":"M.S. Gast","year":"2002","unstructured":"Gast, M.S.: 802.11 Wireless Networks: The Definitive Guide, pp. 33\u201366. O\u2019Reilly Publisher, Sebastopol (2002)"},{"key":"8_CR4","doi-asserted-by":"crossref","unstructured":"Malekzadeh, M.: Empirical Analysis of Virtual Carrier Sense Flooding Attacks over Wireless Local Area Network. Journal of Computer Science (2009)","DOI":"10.3844\/jcssp.2009.214.220"},{"key":"8_CR5","unstructured":"Zhou, Y., Wu, D., Nettles, S.: Analyzing and Preventing MAC-Layer Denial of Service Attacks for Stock 802.11 Systems. In: Workshop on BWSA, Broadnets (2004)"},{"key":"8_CR6","doi-asserted-by":"crossref","unstructured":"Karlof, C., Sastry, N., Wagner, D.: TinySec: A link Layer Security Architecture for Wireless Sensor Networks. In: SenSys (2004)","DOI":"10.1145\/1031495.1031515"},{"key":"8_CR7","unstructured":"Bellardo, J., Savage, S.: 802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions. In: USENIX Security Symposium (2003)"},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"Krovetz, T.: RFC4418-UMAC: Message Authentication Code using Universal Hashing. In: IEEE Network Working Group (March 2006)","DOI":"10.17487\/rfc4418"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2010"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-12179-1_8.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:50:33Z","timestamp":1606186233000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-12179-1_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642121784","9783642121791"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-12179-1_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}