{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,9,15]],"date-time":"2023-09-15T04:59:29Z","timestamp":1694753969322},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2013,12,19]],"date-time":"2013-12-19T00:00:00Z","timestamp":1387411200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2014,8]]},"DOI":"10.1007\/s10207-013-0223-8","type":"journal-article","created":{"date-parts":[[2013,12,18]],"date-time":"2013-12-18T05:14:50Z","timestamp":1387343690000},"page":"355-366","source":"Crossref","is-referenced-by-count":3,"title":["Enhancing security of cookie-based sessions in mobile networks using sparse caching"],"prefix":"10.1007","volume":"13","author":[{"given":"Amerah","family":"Alabrah","sequence":"first","affiliation":[]},{"given":"Jeffrey","family":"Cashion","sequence":"additional","affiliation":[]},{"given":"Mostafa","family":"Bassiouni","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,12,19]]},"reference":[{"issue":"1","key":"223_CR1","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1109\/MWC.2005.1404570","volume":"12","author":"J Chen","year":"2005","unstructured":"Chen, J., Jiang, M., Liu, Y.: Wireless LAN security and IEEE 802.11i. IEEE Wirel. Commun. 12(1), 27\u201336 (2005)","journal-title":"IEEE Wirel. Commun."},{"issue":"2","key":"223_CR2","first-page":"224","volume":"12","author":"C Sreedhar","year":"2010","unstructured":"Sreedhar, C., Madhusudhana, S., Kasiviswanath, N.: A survey on security issues in wireless ad hoc network routing protocols. Int. J. Comp. Sci. Eng. 12(2), 224\u2013232 (2010)","journal-title":"Int. J. Comp. Sci. Eng."},{"key":"223_CR3","doi-asserted-by":"crossref","unstructured":"Siddiqui, M., Hong, C.: Security issues in wireless mesh networks. In: Proceedings of IEEE International Conference on Multimedia and Ubiquitous Engineering (MUE\u201907). Seoul, Korea (2007)","DOI":"10.1109\/MUE.2007.187"},{"issue":"3","key":"223_CR4","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1109\/COMST.2008.4625802","volume":"10","author":"Y Zhou","year":"2008","unstructured":"Zhou, Y., Fang, Y., Zhang, Y.: Securing wireless sensor networks: a survey. IEEE Commun. Surv. 10(3), 6\u201328 (2008)","journal-title":"IEEE Commun. Surv."},{"key":"223_CR5","unstructured":"Ponurkiewicz, B.: FaceNiff\u2014A new Android download application. http:\/\/faceniff.ponury.net\/ . Accessed 26 Jan 2012"},{"key":"223_CR6","unstructured":"Butler, E.: FireSheep: cookie snatching made simple. In: ToorCon Conference. San Diego, CA (2010). Software available at http:\/\/codebutler.com\/firesheep"},{"key":"223_CR7","doi-asserted-by":"crossref","unstructured":"Riley, R., Ali, N., Al-Senaidi, K., Al-Kuwari, A.: Empowering users against sidejacking attacks. In: Proceedings of the ACM SIGCOMM Conference on SIGCOMM. New Delhi, India (2010)","DOI":"10.1145\/1851182.1851249"},{"key":"223_CR8","doi-asserted-by":"crossref","unstructured":"Liu, A., Kovacs, J., Huang, C., Gouda, M.: A secure cookie protocol. In: Proceedings of 14th International Conference on Computer Communications and Networks (2005)","DOI":"10.1109\/ICCCN.2005.1523880"},{"issue":"11","key":"223_CR9","doi-asserted-by":"crossref","first-page":"770","DOI":"10.1145\/358790.358797","volume":"24","author":"L Lamport","year":"1981","unstructured":"Lamport, L.: Password authentication with insecure communication. Commun. ACM 24(11), 770\u2013772 (1981)","journal-title":"Commun. ACM"},{"issue":"10","key":"223_CR10","doi-asserted-by":"crossref","first-page":"1916","DOI":"10.1109\/JSAC.2006.877223","volume":"24","author":"Y Zhang","year":"2006","unstructured":"Zhang, Y., Fang, Y.: ARSA: an attack-resilient security architecture for multihop wireless mesh networks. IEEE J. Sel. Areas Commun. 24(10), 1916\u20131928 (2006)","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"1\u20132","key":"223_CR11","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1007\/s11276-004-4744-y","volume":"11","author":"Y Hu","year":"2005","unstructured":"Hu, Y., Perrig, A., Johnson, D.: Ariadne: a secure on-demand routing protocol for ad hoc networks. Wirel. Netw. 11(1\u20132), 21\u201338 (2005)","journal-title":"Wirel. Netw."},{"key":"223_CR12","unstructured":"Hu, Y., Johnson, D., Perrig, A.: SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks. In: Proceedings of the 4th IEEE Workshop on Mobile Computing Systems and Applications (WMCSA 2002), pp. 3\u201313. Calicoon, NY (2002)"},{"key":"223_CR13","unstructured":"Dacosta, I., Chakradeo, S., Ahamad, M., Traynor, P.: One-time cookies: preventing session hijacking attacks with disposable credentials. Technical Report Georgia Institute of Technology (2011). http:\/\/smartech.gatech.edu\/bitstream\/handle\/1853\/37000\/GT-CS-11-04.pdf"},{"key":"223_CR14","doi-asserted-by":"crossref","unstructured":"Cashion, J., Bassiouni, M.: Robust and low-cost solution for preventing sidejacking attacks in wireless networks using a rolling code. In: Proceedings of the 7th ACM International Symposium on QoS and Security of Wireless and Mobile Networks (Q2SWinet\u201911), pp. 21\u201326. Miami Beach, Florida (2011)","DOI":"10.1145\/2069105.2069110"},{"key":"223_CR15","doi-asserted-by":"crossref","unstructured":"Liu, D., Ning, P.: Multilevel $$\\mu $$ \u03bc TESLA: broadcast authentication for distributed sensor networks. Trans. Embed. Comput. Syst. (TECS) 3(40) (2004)","DOI":"10.1145\/1027794.1027800"},{"key":"223_CR16","doi-asserted-by":"crossref","unstructured":"Tan, H., Jha, S., Ostry, D., Zic, J., Sivaraman, V.: Secure multi-hop network programming with multiple one-way key chains. In: Proceedings of the First ACM Conference on Wireless Network Security-WiSec \u201908 (2008)","DOI":"10.1145\/1352533.1352564"},{"issue":"2","key":"223_CR17","doi-asserted-by":"crossref","first-page":"148","DOI":"10.1016\/j.adhoc.2009.06.002","volume":"8","author":"I Khalil","year":"2010","unstructured":"Khalil, I., Bagchi, S., Rotaru, C.N., Shroff, N.B.: UnMask: utilizing neighbor monitoring for attack mitigation in multihop wireless sensor networks. Ad Hoc Netw. 8(2), 148\u2013164 (2010)","journal-title":"Ad Hoc Netw."},{"issue":"2","key":"223_CR18","first-page":"18","volume":"9","author":"M Li","year":"2013","unstructured":"Li, M., Yu, S., Guttman, J.D., Lou, W., Ren, K.: Secure ad hoc trust initialization and key management in wireless body area networks. ACM Trans. Sens. Netw. (TOSN) 9(2), 18 (2013)","journal-title":"ACM Trans. Sens. Netw. (TOSN)"},{"key":"223_CR19","unstructured":"Chen, T.H., Hsiang, H.C., Shih, W.K.: Security enhancement on an improvement on two remote user authentication schemes using smart cards. Future Gener. Comput. Syst. 27(4), 377\u2013380 (2011)"},{"issue":"1","key":"223_CR20","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jnca.2009.08.001","volume":"33","author":"CT Li","year":"2010","unstructured":"Li, C.T., Hwang, M.S.: An efficient biometrics-based remote user authentication scheme using smart cards. J Netw. Comput. Appl. 33(1), 1\u20135 (2010)","journal-title":"J Netw. Comput. Appl."},{"issue":"1","key":"223_CR21","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1016\/j.elerap.2005.10.009","volume":"6","author":"X Dai","year":"2007","unstructured":"Dai, X., Grundy, J.: NetPay: an off-line, decentralized micro-payment system for thin-client applications. Electron. Commer. Res. Appl. 6(1), 91\u2013101 (2007)","journal-title":"Electron. Commer. Res. Appl."},{"issue":"4","key":"223_CR22","doi-asserted-by":"crossref","first-page":"499","DOI":"10.1016\/j.elerap.2007.02.009","volume":"6","author":"H Liaw","year":"2008","unstructured":"Liaw, H., Lin, J., Wu, W.: A new electronic traveler\u2019s check scheme based on one-way hash function. Electron. Commer. Res. Appl. 6(4), 499\u2013508 (2008)","journal-title":"Electron. Commer. Res. Appl."},{"key":"223_CR23","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4615-3604-8_9","volume-title":"Reducing Memory and Traffic Requirements for Scalable Directory-based Cache Coherence Schemes","author":"A Gupta","year":"1992","unstructured":"Gupta, A., Weber, W., Mowry, T.: Reducing Memory and Traffic Requirements for Scalable Directory-based Cache Coherence Schemes. Springer, NY (1992)"},{"key":"223_CR24","doi-asserted-by":"crossref","unstructured":"Deftu, A., Murarasu, A.: Optimization techniques for dimensionally truncated sparse grids on heterogeneous systems. In: Proceedings of the 21st Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP), pp. 351\u2013358 (2013)","DOI":"10.1109\/PDP.2013.57"},{"key":"223_CR25","doi-asserted-by":"crossref","unstructured":"Lau, W., Kumar, M., Venkatesh, S.: A cooperative cache architecture in support of caching multimedia objects in MANETs. In: Proceedings of the 5th ACM International Workshop on Wireless Mobile Multimedia, pp. 56\u201363 (2002)","DOI":"10.1145\/570790.570800"},{"key":"223_CR26","doi-asserted-by":"crossref","unstructured":"Douglas, C. C., Hu, J., Iskandarani, M., Kowarschik, M., R\u00fcde, U., Weiss, C.: Maximizing cache memory usage for multigrid algorithms. In: Chen, Z., et al. (eds.) Multiphase Flows and Transport in Porous Media: State of the Art. Lecture Notes in Physics, vol. 552, pp. 124\u2013137. Springer, Berlin (2000)","DOI":"10.1007\/3-540-45467-5_10"},{"key":"223_CR27","doi-asserted-by":"crossref","unstructured":"Hu, Y., Jakobsson, M., Perrig, A.: Efficient constructions for one-way hash chains. In: Applied Cryptography and Network Security. Lecture Notes in Computer Science, vol. 3531, pp. 423\u2013441. Springer, Berlin (2005)","DOI":"10.1007\/11496137_29"},{"issue":"2","key":"223_CR28","doi-asserted-by":"crossref","first-page":"162","DOI":"10.1145\/1151414.1151417","volume":"9","author":"R Chandramouli","year":"2006","unstructured":"Chandramouli, R., Bapatla, S., Subbalakshmi, K., Uma, R.: Battery power-aware encryption. ACM Trans. Inf. Syst. Secur. (TISSEC) 9(2), 162\u2013180 (2006)","journal-title":"ACM Trans. Inf. Syst. Secur. (TISSEC)"},{"key":"223_CR29","doi-asserted-by":"crossref","unstructured":"Potlapally, N., Ravi, S., Raghunathan, A., Jha, N.: Analyzing the energy consumption of security protocols. In: Proceedings of the 2003 International Symposium on Low Power Electronics and Design, pp. 30\u201335 (2003)","DOI":"10.1145\/871506.871518"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-013-0223-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10207-013-0223-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-013-0223-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,4]],"date-time":"2019-08-04T22:23:02Z","timestamp":1564957382000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10207-013-0223-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12,19]]},"references-count":29,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2014,8]]}},"alternative-id":["223"],"URL":"https:\/\/doi.org\/10.1007\/s10207-013-0223-8","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,12,19]]}}}