{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,10]],"date-time":"2025-06-10T07:47:34Z","timestamp":1749541654941,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642176098"},{"type":"electronic","value":"9783642176104"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-17610-4_23","type":"book-chapter","created":{"date-parts":[[2010,11,24]],"date-time":"2010-11-24T12:57:18Z","timestamp":1290603438000},"page":"207-219","source":"Crossref","is-referenced-by-count":2,"title":["Wireless Network Security Vulnerabilities and Concerns"],"prefix":"10.1007","author":[{"given":"Ahmad","family":"Mushtaq","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"23_CR1","unstructured":"Karygiannis, T., Owens, L.: Wireless Network Security: 802.11, Bluetooth and Handheld Devices, National Institute of Standards and Technology Gaithersburg, MD 20899-8930 (November 2002)"},{"key":"23_CR2","unstructured":"http:\/\/www.wirelesstutorials.info\/wireless_networking.html"},{"key":"23_CR3","unstructured":"http:\/\/en.wikipedia.org\/wiki\/Photophone#World.27s_first_wireless_telephone_communication_E2.80.93_April_1880"},{"key":"23_CR4","volume-title":"Wireless Communications and Networks","author":"W. Stallings","year":"2001","unstructured":"Stallings, W.: Wireless Communications and Networks. Prentice Hall, Englewood Cliffs (August 2001)"},{"key":"23_CR5","volume-title":"The Handbook of Information Security","author":"H. Bidgoli","year":"2005","unstructured":"Bidgoli, H.: The Handbook of Information Security. John Wiley & Sons, Inc., Chichester (2005)"},{"key":"23_CR6","unstructured":"Wireless networks have had a significant impact on the world as far back as World War II. Through the use of wireless networks, wikipedia.org\/wiki\/Wireless_network"},{"key":"23_CR7","unstructured":"Wi-Fi Protected Access (WPA and WPA2) is a certification program developed by the Wi-Fi Alliance to indicate compliance with the security protocol, wikipedia.org\/wiki\/Wi-Fi_Protected_Access"},{"key":"23_CR8","unstructured":"Brenner, P.: A Technical Tutorial on the IEEE 802-11 Protocol, Director of Engineering, BreezCom"},{"key":"#cr-split#-23_CR9.1","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Wenke, L.: Intrusion Detection in Wireless Ad-Hoc Networks. In: Proceedings of the Sixth Annual International Conference on Mobile Computing and Networking (2000)","DOI":"10.1145\/345910.345958"},{"key":"#cr-split#-23_CR9.2","doi-asserted-by":"crossref","unstructured":"Arbaugh, W.A., Shankar, N., Justin Wan, Y.C.: Your 802.11 Wireless Network has No Clothes. Department of Computer Science, University of Maryland, March 31 (2001)","DOI":"10.1142\/9789812799562_0013"},{"key":"23_CR10","doi-asserted-by":"crossref","unstructured":"Borisov, N., Goldberg, I., Wagner, D.: Intercepting Mobile Communiccation Conference on Mobile Computing and Networking (2001), http:\/\/www.springerlink.com\/index\/cjut5dxd8r9tvrpe.pdf","DOI":"10.1145\/381677.381695"},{"key":"23_CR11","unstructured":"Borisov, N., Goldberg, I., Wagner, D., Berkeley, U.C., Cox, J.: LAN Services Set to Go Wireless, Network World, August 20 (2001); IEEE Working Group for WLAN Standards, http:\/\/grouper.ieee.org\/groups\/802\/11\/index.html"},{"key":"23_CR12","volume-title":"Deploying Wireless LANs and Voice & Data","author":"N. Borisov","year":"2001","unstructured":"Borisov, N.: Deploying Wireless LANs and Voice & Data. McGraw-Hill, New York (2001), doi.ieeecomputersociety.org\/10.1109\/6294.977772"},{"key":"23_CR13","unstructured":"Bradley, T.: CISSP-ISSAP, Introduction to Packet\u00a0Sniffing, former About.com Guide"},{"key":"23_CR14","unstructured":"Borisov, N., Goldberg, I., Wagnert, D.: Security of the WEP algorithm, wep@isaac.cs.berkeley.edu"},{"key":"23_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/978-3-540-25937-4_16","volume-title":"Fast Software Encryption","author":"S. Paul","year":"2004","unstructured":"Paul, S., Preneel, B.: A new weakness in the RC4 keystream generator and an approach to improve the security of the cipher. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol.\u00a03017, pp. 245\u2013259. Springer, Heidelberg (2004)"},{"key":"23_CR16","unstructured":"Khan, S., et al.: Denial of Service Attacks and Challenges in Broadband Wireless Networks. IJCSNS International Journal of Computer Science and Network Security\u00a08(7) (July 2008)"},{"key":"23_CR17","unstructured":"Ingeborn, A., Ingeborn: Lucent Orinoco Registry Encryption\/Decryption, http:\/\/www.cqure.net\/tools03.html"},{"key":"23_CR18","unstructured":"Tzu, S., Zi, S.: The Art of War. Dover Publications, New Paperback, 96 pages (2002) ISBN 0486425576"}],"container-title":["Communications in Computer and Information Science","Security Technology, Disaster Recovery and Business Continuity"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-17610-4_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,14]],"date-time":"2021-11-14T02:21:59Z","timestamp":1636856519000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-17610-4_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642176098","9783642176104"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-17610-4_23","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2010]]}}}