{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T03:33:04Z","timestamp":1725679984785},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,1]]},"DOI":"10.1109\/ccnc.2010.5421585","type":"proceedings-article","created":{"date-parts":[[2010,3,2]],"date-time":"2010-03-02T14:38:06Z","timestamp":1267540686000},"page":"1-5","source":"Crossref","is-referenced-by-count":2,"title":["IEEE 802.11 Wireless LAN Control Frame Protection"],"prefix":"10.1109","author":[{"given":"Sushma","family":"Myneni","sequence":"first","affiliation":[]},{"given":"Dijiang","family":"Huang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"2003","key":"ref10"},{"key":"ref11","article-title":"802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions","author":"bellardo","year":"2003","journal-title":"Proceedings of USENIX Security Symposium"},{"key":"ref12","article-title":"HMAC: Keyed-Hashing for Message Authentication","author":"crawczyk","year":"1997","journal-title":"RFC 2104"},{"key":"ref13","article-title":"US Secure Hash Algorithm 1 (SHAl)","author":"eastlake","year":"2001","journal-title":"RFC 3174"},{"journal-title":"WPA Wi-Fi Protected Access Strong standards-based interoperable security for today's Wi-Fi networks","year":"2003","key":"ref4"},{"journal-title":"Wi-Fi Alliance An Overview of the Wi-Fi Alliance Approach to Certification","year":"2006","key":"ref3"},{"year":"2004","key":"ref6"},{"journal-title":"Wi-Fi Protected Access","year":"2004","key":"ref5"},{"year":"2003","key":"ref8"},{"key":"ref7","first-page":"36","article-title":"Throughput Performance of the Distributed and Point Coordination Functions of an IEEE 802.11 Wireless LAN","author":"chandran-wadia","year":"2002","journal-title":"proceedings of 15th international conference on Computer communication"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(07)70019-3"},{"year":"1999","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/956981.956990"}],"event":{"name":"2010 7th IEEE Consumer Communications and Networking Conference (CCNC)","start":{"date-parts":[[2010,1,9]]},"location":"Las Vegas, NV, USA","end":{"date-parts":[[2010,1,12]]}},"container-title":["2010 7th IEEE Consumer Communications and Networking Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5419385\/5421566\/05421585.pdf?arnumber=5421585","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,19]],"date-time":"2017-03-19T00:43:14Z","timestamp":1489884194000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5421585\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,1]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/ccnc.2010.5421585","relation":{},"subject":[],"published":{"date-parts":[[2010,1]]}}}