{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:32:11Z","timestamp":1725557531139},"publisher-location":"Dordrecht","reference-count":20,"publisher":"Springer Netherlands","isbn-type":[{"type":"print","value":"9789048187515"},{"type":"electronic","value":"9789048187522"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-90-481-8752-2_5","type":"book-chapter","created":{"date-parts":[[2010,6,8]],"date-time":"2010-06-08T14:19:05Z","timestamp":1276006745000},"page":"215-250","source":"Crossref","is-referenced-by-count":0,"title":["Security Sublayer"],"prefix":"10.1007","author":[{"given":"Ramjee","family":"Prasad","sequence":"first","affiliation":[]},{"given":"Fernando J.","family":"Velez","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,2,18]]},"reference":[{"key":"5_CR1_5","doi-asserted-by":"crossref","unstructured":"C. Eklund, R.B. Marks, K.L. Stanwood, S. Wang, IEEE Standard 802.16: A Technical Overview of the WirelessMAN Air Interface for Broadband Wireless Access (June 2002)","DOI":"10.1109\/MCOM.2002.1007415"},{"issue":"3","key":"5_CR2_5","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/MSP.2004.20","volume":"2","author":"D Johnston","year":"2004","unstructured":"D. Johnston, J. Walker, Overview of IEEE 802.16 security. IEEE Secur. Privacy Mag. 2(3), 40\u201348 (2004)","journal-title":"IEEE Secur. Privacy Mag."},{"key":"5_CR3_5","unstructured":"IEEE Std 802.16e-2005, 2006. Standard for Local and metropolitan area networks Part 16: Air Interface for Fixed and Mobile Broadband Wireless Access Systems Amendment 2: Physical and Medium Access Control Layers for Combined Fixed and Mobile Operation in Licensed Bands and Corrigendum 1, IEEE, New York, USA"},{"key":"5_CR4_5","volume-title":"Principles of Wireless Networks: A unified Approach","author":"K Pahlavan","year":"2002","unstructured":"K. Pahlavan, P. Krishnamurthy, Principles of Wireless Networks: A unified Approach (Pearson Education, Prentice Hall PTR, Upper Saddle River, NJ, 2002)"},{"key":"5_CR5_5","volume-title":"Cryptography and Network Security: Principles and Practices","author":"W Stalling","year":"2003","unstructured":"W. Stalling, Cryptography and Network Security: Principles and Practices, 3rd edn. (Pearson Education, Prentice Hall PTR, Upper Saddle River, NJ, 2003)","edition":"3"},{"key":"5_CR6_5","unstructured":"PKCS#1 v2.0,RSA Cryptography Standard, RSA Laboratories (Oct 1998)"},{"key":"5_CR7_5","unstructured":"National Technical Information Service (NTIS), FIPS 46-3, Data Encryption Standard (DES) (Oct 1999). http:\/\/www.ntis.gov\/"},{"key":"5_CR8_5","unstructured":"National Technical Information Service (NTIS), FIPS 197, Advanced Encryption Standard (AES) (Nov 2001)"},{"key":"5_CR9_5","unstructured":"National Technical Information Service (NTIS), FIPS 198, The key Hash Message Authentication Code (HMAC) (Mar 2002)"},{"key":"5_CR10_5","doi-asserted-by":"crossref","unstructured":"H. Krawczyk, M. Bellare, R. Canetti, IETF RFC. HMAC: Keyed-Hashing for Message Authentication (Feb 1997)","DOI":"10.17487\/rfc2104"},{"key":"5_CR11_5","unstructured":"J.H. Song et al., IETF RFC 4493. The AES-CMAC Algorithm (June 2006)"},{"key":"5_CR12_5","unstructured":"IEEE 802.16 Broadband Wireless Access Working Group. Mapping of authentication Rejection from PKMv1 to PKMv2, IEEE (April 2008). http:\/\/www.ieee802.org\/16\/maint\/"},{"key":"5_CR13_5","unstructured":"FIPS 74, Guidelines for Implementing and Using the NBS Data Encryption Standard (Apr 1981)"},{"key":"5_CR14_5","unstructured":"FIPS 81, DES Modes of Operation (Dec 1980)"},{"key":"5_CR15_5","unstructured":"IETF RFC 3610, Counter with CBC-MAC (CCM) (D. Whiting et al., Sept 2003)"},{"key":"5_CR16_5","unstructured":"M. Barbeau, WiMax\/802.16 Threat Analysis, School of Computer Science, Carleton University, Ottawa, Canada (October 2005)"},{"key":"5_CR17_5","doi-asserted-by":"crossref","unstructured":"C. Rigney et al., Remote dial-in user service (RADIUS). IETF RFC 2865 (June 2000)","DOI":"10.17487\/rfc2865"},{"key":"5_CR18_5","volume-title":"Fundamentals of WiMAX: Understanding Broadband Wireless Networking","author":"A Ghost","year":"2007","unstructured":"A. Ghost, R. Muhamed, J.G. Andrews, Fundamentals of WiMAX: Understanding Broadband Wireless Networking (Prentice Hall, Upper Saddle River, NJ, 2007)"},{"key":"5_CR19_5","unstructured":"P. Calhoun et al., Diameter in use. IETF RFC 3588 (Sept 2003)"},{"key":"5_CR20_5","doi-asserted-by":"crossref","unstructured":"S. Xu, M. Matthews, C.-T. Huang, Security issues in privacy and key management protocols of IEEE 802.16, in Proceedings of the 44th ACM Southeast Conference (ACMSE 2006) (Mar 2006)","DOI":"10.1145\/1185448.1185474"}],"container-title":["WiMAX Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-90-481-8752-2_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T18:52:36Z","timestamp":1559155956000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-90-481-8752-2_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9789048187515","9789048187522"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-90-481-8752-2_5","relation":{},"subject":[],"published":{"date-parts":[[2010]]}}}