{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T13:05:00Z","timestamp":1730207100902,"version":"3.28.0"},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,10]]},"DOI":"10.1109\/cisim.2010.5643656","type":"proceedings-article","created":{"date-parts":[[2010,11,30]],"date-time":"2010-11-30T21:34:10Z","timestamp":1291152850000},"page":"250-254","source":"Crossref","is-referenced-by-count":2,"title":["On enhancing the WEP security against brute-force and compromised keys"],"prefix":"10.1109","author":[{"given":"Saif Ur","family":"Rehman","sequence":"first","affiliation":[]},{"given":"Saeed","family":"Ullah","sequence":"additional","affiliation":[]},{"given":"Sardar","family":"Ali","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","first-page":"972","article-title":"Modified aggressive mode of internet key exchange resistant against denial-of-service attacks","volume":"e83 d","author":"matsuura","year":"2000","journal-title":"IEICE Transactions on Information and Systems"},{"key":"ref3","article-title":"Secure enhance wireless transfer protocol","author":"lin","year":"2006","journal-title":"Proceedings of International Conference on Availability Reliability and Security"},{"journal-title":"IEEE Standard for Information technology Telecommunications and information exchange between systems Local and metropolitan area networks Specific requirements Part 11 Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications Amendment 2 Fast Basic Service Set (BSS) Transition","year":"2008","key":"ref10"},{"key":"ref6","article-title":"Using the Fluhrer Mantin and Shamir Attack to break WEP","volume":"21","author":"stubblefield","year":"2001","journal-title":"Technical Report TD-4ZCPZZ AT&T Labs"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1023646.1023655"},{"year":"0","key":"ref5"},{"year":"2004","key":"ref8","article-title":"Medium Access Control (MAC) security enhancements, amendment 6 to IEEE standard for information technology telecommunications and information exchange between systems Local and metropolitan area networks Specific requirements Part 11: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications"},{"journal-title":"IEEE Standard 802 11 1999","article-title":"Wireless LAN medium access control (MAC) and physical layer (PHY) specifications","year":"1999","key":"ref7"},{"key":"ref2","first-page":"124","article-title":"Weaknesses in the Key Scheduling Algorithm of RC4","volume":"2259","author":"fluhrer","year":"2001","journal-title":"LNCS"},{"first-page":"22204","article-title":"1x for local and metropolitan area networks port-based network access control national communications system technology and programs division (N2) PO Box 4502","year":"2005","key":"ref9"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/381677.381695"}],"event":{"name":"2010 International Conference on Computer Information Systems and Industrial Management Applications (CISIM)","start":{"date-parts":[[2010,10,8]]},"location":"Krackow, Poland","end":{"date-parts":[[2010,10,10]]}},"container-title":["2010 International Conference on Computer Information Systems and Industrial Management Applications (CISIM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5637902\/5643452\/05643656.pdf?arnumber=5643656","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T10:55:55Z","timestamp":1490093755000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5643656\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,10]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/cisim.2010.5643656","relation":{},"subject":[],"published":{"date-parts":[[2010,10]]}}}