{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T17:54:08Z","timestamp":1754157248624,"version":"3.41.2"},"reference-count":9,"publisher":"Emerald","issue":"1","license":[{"start":{"date-parts":[[2004,2,1]],"date-time":"2004-02-01T00:00:00Z","timestamp":1075593600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004,2,1]]},"abstract":"<jats:p>Playing games over the wireless Internet is significantly more dangerous than using traditional wired networks. Wireless networks offer new hackers new ways to attack. Since there is no physical connection for wireless networks, it is also more difficult to prevent attacks or locate the attackers.  This paper will review the unique threats inherent in the wireless gaming environment and present a model aimed at solving these problems.<\/jats:p>","DOI":"10.1108\/02640470410520069","type":"journal-article","created":{"date-parts":[[2004,2,24]],"date-time":"2004-02-24T18:46:24Z","timestamp":1077648384000},"page":"8-15","source":"Crossref","is-referenced-by-count":0,"title":["Infrastructure for games on wireless Internet"],"prefix":"10.1108","volume":"22","author":[{"given":"Alfred","family":"Loo","sequence":"first","affiliation":[]},{"given":"Charlie","family":"Choi","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2022012920043535800_B1","doi-asserted-by":"crossref","unstructured":"Arbarugh, W., Shankar, N. and Wan, J. (2001), \u201cYour 802.11 wireless network has no clothes\u201d, available at: www.cs.umd.edu\/\u223cwaa\/wireless.pdf","DOI":"10.1142\/9789812799562_0013"},{"key":"key2022012920043535800_B2","unstructured":"Ashley, P., Hinton, H. and Vandenwauver, M. (2001), \u201cWired versus wireless security: the Internet, WAP and i\u2010mode for e\u2010commerce\u201d, Proceedings of the 17th Annual Computer Security Applications Conference, New Orleans, LA."},{"key":"key2022012920043535800_B3","unstructured":"Beaulieu, M. (2002), Wireless Internet Applications and Architecture: Building Professional Wireless Application Worldwide, Addison\u2010Wesley, Boston, MA."},{"key":"key2022012920043535800_B4","unstructured":"Cook, J. (2001), WAP Servlets,: Professional Developer\u2019s Guide, John Wiley & Sons, New York, NY."},{"key":"key2022012920043535800_B5","unstructured":"Flickenger, R. (2002), Building Wireless Community Networks, O\u2019Reilly, Sebastopol, CA."},{"key":"key2022012920043535800_B6","unstructured":"Lamm, G., Falauto, G., Estrada, J. and Gadiyaram, J. (2001), \u201cBluetooth wireless networks security features\u201d, Proceedings of the 2001 IEEEE Workshop on Information Assurance and Security, Anaheim, CA."},{"key":"key2022012920043535800_B7","unstructured":"Maxim, M. and Pllino, D. (2002), Wireless Security, McGraw\u2010Hill, New York, NY."},{"key":"key2022012920043535800_B8","unstructured":"Park, S., Ganz, A. and Ganz, Z. (1998), \u201cSecurity protocol for IEEE 802.11 wireless local area network\u201d, Mobil Network and Application, Vol. 3 No. 3, pp. 237\u201046."},{"key":"key2022012920043535800_B9","unstructured":"Weatherspoon, S. (2002), \u201cOverview of IEEE802.11b security\u201d, Intel Technology Journal, 7 June."}],"container-title":["The Electronic Library"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/02640470410520069","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/02640470410520069\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/02640470410520069\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T23:41:11Z","timestamp":1753400471000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/el\/article\/22\/1\/8-15\/33685"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,2,1]]},"references-count":9,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2004,2,1]]}},"alternative-id":["10.1108\/02640470410520069"],"URL":"https:\/\/doi.org\/10.1108\/02640470410520069","relation":{},"ISSN":["0264-0473"],"issn-type":[{"type":"print","value":"0264-0473"}],"subject":[],"published":{"date-parts":[[2004,2,1]]}}}