{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T02:22:47Z","timestamp":1725675767639},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642294785"},{"type":"electronic","value":"9783642294792"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-29479-2_16","type":"book-chapter","created":{"date-parts":[[2012,4,19]],"date-time":"2012-04-19T03:14:16Z","timestamp":1334805256000},"page":"206-218","source":"Crossref","is-referenced-by-count":5,"title":["Design and Implementation of a Simulation Environment for the Evaluation of Authentication Protocols in IEEE 802.11s Networks"],"prefix":"10.1007","author":[{"given":"Ikbel","family":"Daly","sequence":"first","affiliation":[]},{"given":"Faouzi","family":"Zarai","sequence":"additional","affiliation":[]},{"given":"Lotfi","family":"Kamoun","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"16_CR1","unstructured":"NS-2, The Network Simulator, \n                    \n                      http:\/\/www.isi.edu\/nsnam\/ns"},{"key":"16_CR2","unstructured":"The ns-3 network simulator, \n                    \n                      http:\/\/www.nsnam.org\/"},{"key":"16_CR3","unstructured":"Andreev, K., Boyko, P.: IEEE 802.11s Mesh Networking NS-3 Model"},{"key":"16_CR4","unstructured":"Catoio, G., Cibot, L., Laloux, M.: Etendre dynamiquement la couverture d\u2019un r\u00e9seau Mesh (2006\/2007)"},{"key":"16_CR5","doi-asserted-by":"crossref","unstructured":"Faccin, S.M., Wijting, C., Kneckt, J., Damle, A.: Mesh wlan networks: concept and system design. IEEE Wireless Communications (April 2006)","DOI":"10.1109\/MWC.2006.1632476"},{"key":"16_CR6","unstructured":"Camp, J.D., Knightly, E.W.: The IEEE 802.11s Extended Service Set Mesh Networking Standard"},{"key":"16_CR7","unstructured":"IEEE P802.11s\/D0.01 Draft Amendment to Standard for Information Technology-Telecommunications and Information Exchange Between Systems - LAN\/MAN Specific Requirements-Part 11: Wireless Medium Access Control (MAC) and physical layer (PHY) specifications: Amendment: ESS Mesh Networking (March 2008)"},{"key":"16_CR8","unstructured":"Qiu, L., Bahl, P., Rao, A., Zhou, L.: Troubleshooting Wireless Mesh Networks"},{"key":"16_CR9","unstructured":"Holzner, S.: Total Java, Editions Eyrolles (2001)"},{"key":"16_CR10","unstructured":"Ajib, W.: Gestion de transmission d\u2019un flux temporaire de donn\u00e9s dans un r\u00e9seau radio mobile d\u2019acc\u00e8s TDMA. Thesis, ENST Paris (2000)"},{"key":"16_CR11","unstructured":"Wai, F.H., Ye, Y.N., James, N.H.: Intrusion Detection in wireless Ad Hoc networks. Introduction to wmobile Computing Technical Report CS4274"},{"key":"16_CR12","doi-asserted-by":"crossref","unstructured":"Daly, I., Zarai, F., Kamoun, L.: Secure Wireless Mobility Management. In: IEEE 17th International Conference on Telecommunications, ICT 2010 (2010)","DOI":"10.1109\/ICTEL.2010.5478851"},{"key":"16_CR13","unstructured":"Huang, D., Lin, P., Gan, C., Jeng, J.: A Mobility Management Mechanism using Location Cache for Wireless Mesh Network. In: QShine 2006, Waterloo, Ontario, Canada, August 1979. ACM (2006)"},{"key":"16_CR14","unstructured":"Khan, K., Akbar, M.: Authentication in Multi-Hop Wireless Mesh Networks. Proceedings of World Academy of Science, Engineering and Technology\u00a016 (November 2006) ISSN 1307-6884"},{"key":"16_CR15","doi-asserted-by":"crossref","unstructured":"Izquierdo, A., Golmie, N., Hoeper, K., Chen, L.: Using the EAP Framework for Fast Media Independent Handover Authentication. National Institute of Standards and Technology, USA (2008)","DOI":"10.4108\/ICST.WICON2008.4814"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Mobile Lightweight Wireless Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-29479-2_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T06:22:26Z","timestamp":1556691746000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-29479-2_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642294785","9783642294792"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-29479-2_16","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2012]]}}}