{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,3]],"date-time":"2022-04-03T21:01:00Z","timestamp":1649019660979},"reference-count":14,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2011,8,26]],"date-time":"2011-08-26T00:00:00Z","timestamp":1314316800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2012,10]]},"DOI":"10.1007\/s11227-011-0673-6","type":"journal-article","created":{"date-parts":[[2011,8,25]],"date-time":"2011-08-25T13:35:30Z","timestamp":1314279330000},"page":"118-133","source":"Crossref","is-referenced-by-count":0,"title":["FSH scheme for high-speed handover and anti-MITM on mobile computing"],"prefix":"10.1007","volume":"62","author":[{"given":"Sekwang","family":"Seo","sequence":"first","affiliation":[]},{"given":"Sang-Soo","family":"Yeo","sequence":"additional","affiliation":[]},{"given":"Young-Sik","family":"Jeong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,8,26]]},"reference":[{"key":"673_CR1","unstructured":"International Telecommunication Union (1988) General characteristics of international telephone connections and international telephone circuits. ITU-TG.114"},{"key":"673_CR2","series-title":"VTC 2001 Fall. IEEE VTS 54th","first-page":"2594","volume-title":"Vehicular Technology Conference","author":"R Shirdokar","year":"2001","unstructured":"Shirdokar R, Kabara J, Krishnamurthy P (2001) A QoS-based indoor wireless data network design for VoIP. In: Vehicular Technology Conference, Oct 2001, VTC 2001 Fall. IEEE VTS 54th, vol 4, pp 2594\u20132598"},{"key":"673_CR3","volume-title":"Proceedings of the ACM MobiSys Conference","author":"M Shin","year":"2004","unstructured":"Shin M, Mishra A, Arbaugh W (2004) Improving the latency of 802.11 hand-offs using neighbor graphs. In: Proceedings of the ACM MobiSys Conference, Boston, MA, June 2004"},{"key":"673_CR4","volume-title":"CCNC\u201908","author":"M Kassab","year":"2008","unstructured":"Kassab M, Bonnin J-M, Belghith A (2008) Fast and secure handover in WLANs: an evaluation of the signaling overhead. In: CCNC\u201908, January 2008"},{"key":"673_CR5","first-page":"103","volume":"18","author":"C Lee","year":"2008","unstructured":"Lee C, Kim S, Oh H, Park C (2008) A group key based authentication protocol providing fast handoff in IEEE 802.11. Korea Inst Inf Secur Cryptol 18:103\u2013113","journal-title":"Korea Inst Inf Secur Cryptol"},{"key":"673_CR6","series-title":"LNCS","first-page":"556","volume-title":"NETWORKING","author":"R Wienzek","year":"2006","unstructured":"Wienzek R, Persaud R (2006) Fast re-authentication for handovers in wireless communication networks. In: NETWORKING. LNCS, vol 3976. Springer, Berlin, pp 556\u2013567"},{"key":"673_CR7","unstructured":"RFC 3788 (2004) Extensible Authentication Protocol (EAP)"},{"key":"673_CR8","unstructured":"Mishra A, Shin M, Arbaugh W (2002) An empirical analysis of the IEEE 802.11 MAC layer handoff process. University of Maryland Technical Report, UMIACS-TR-2002-75"},{"key":"673_CR9","volume-title":"ACM MobiWac\u201904","author":"S Shin","year":"2004","unstructured":"Shin S, Rawat AS, Schulzrinne H (2004) Reducing MAC layer handoff. latency in IEEE 802.11 wireless LANs. In: ACM MobiWac\u201904, Oct 2004"},{"key":"673_CR10","unstructured":"(2001) http:\/\/grouper.ieee.org\/groups\/802\/11\/"},{"issue":"5","key":"673_CR11","doi-asserted-by":"crossref","first-page":"917","DOI":"10.1109\/JSAC.2004.826929","volume":"22","author":"JW Robinson","year":"2004","unstructured":"Robinson JW, Randhawa TS (2004) Saturation throughput analysis of IEEE 802.11e enhanced distributed coordination function. IEEE J Sel Areas Commun 22(5):917\u2013928","journal-title":"IEEE J Sel Areas Commun"},{"key":"673_CR12","unstructured":"Security of the WEP Algorithm (2011) http:\/\/www.isaac.cs.berkeley.edu\/isaac\/wep-faq.html"},{"key":"673_CR13","volume-title":"AAA and network security for mobile access radius, diameter, EAP, PKI and IP mobility","author":"M Nakhjiri","year":"2006","unstructured":"Nakhjiri M, Nakhjiri M (2006) AAA and network security for mobile access radius, diameter, EAP, PKI and IP mobility. Wiley, New York"},{"key":"673_CR14","volume-title":"Selected Areas in Cryptography","author":"SR Fluhrer","year":"2001","unstructured":"Fluhrer SR, Mantin I, Shamir A (2001) Weaknesses in the key scheduling algorithm of RC4. In: Selected Areas in Cryptography, 2001"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-011-0673-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11227-011-0673-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-011-0673-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T10:24:05Z","timestamp":1559384645000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11227-011-0673-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,8,26]]},"references-count":14,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2012,10]]}},"alternative-id":["673"],"URL":"https:\/\/doi.org\/10.1007\/s11227-011-0673-6","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,8,26]]}}}