{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T23:55:21Z","timestamp":1772063721485,"version":"3.50.1"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,9]]},"DOI":"10.1109\/cns.2015.7346809","type":"proceedings-article","created":{"date-parts":[[2015,12,8]],"date-time":"2015-12-08T22:19:48Z","timestamp":1449613188000},"page":"44-52","source":"Crossref","is-referenced-by-count":5,"title":["A novel and scalable communication-history-based Knapsack authentication framework for IEEE 802.11 networks"],"prefix":"10.1109","author":[{"given":"Changmin","family":"Lee","sequence":"first","affiliation":[]},{"family":"Chen Shen","sequence":"additional","affiliation":[]},{"given":"Gokhan","family":"Sahin","sequence":"additional","affiliation":[]},{"given":"Kwanghee","family":"Choi","sequence":"additional","affiliation":[]},{"given":"Hyeong-Ah","family":"Choi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/IAW.2005.1495975"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1090\/psapm\/042\/1095552"},{"key":"ref12","article-title":"Wireshark & ethereal network protocol analyzer toolkit (jay beale's open source security)","author":"angela","year":"0"},{"key":"ref13","article-title":"Characterizing the ieee 802.11 traffic: the wireless side","author":"yeo","year":"2004"},{"key":"ref14","author":"rappaport","year":"1996","journal-title":"Wireless Communications Principles and Practice"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2012.63"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1161289.1161297"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1409944.1409949"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2008.070194"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6567061"},{"key":"ref4","article-title":"50 incredible wifi tech statistics that businesses must know","year":"0"},{"key":"ref27","article-title":"Arm security technology - building a secure system using trustzone technology","year":"0"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2012.6364903"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1998412.1998424"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2002.1179634"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01957-9_25"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195841"},{"key":"ref2","first-page":"1","article-title":"Ieee standard for information technology-telecommunications and information exchange between systems local and metropolitan area networks-specific requirements part 11: Wireless lan medium access control (mac) and physical layer (phy) specifications","year":"2012","journal-title":"IEEE Std 802 11&#x2013;2012 (Revision of IEEE Std 802 11-2007)"},{"key":"ref9","article-title":"Solar-powered password theft - turning a raspberry pi into an automated data sequestration system","author":"hijjawi","year":"2014","journal-title":"The 4th International Conference on the Internet of Things (IoT"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2014.6997467"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1925861.1925870"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/584091.584093"},{"key":"ref21","article-title":"Linux mac80211","year":"0"},{"key":"ref24","article-title":"hostapd: Ieee 802.11 ap, ieee 802.1 x\/wpa\/wpa2\/eap\/radius authenticator","author":"malinen","year":"2006"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1978.1055927"},{"key":"ref26","article-title":"Scapy","author":"biondi","year":"2011"},{"key":"ref25","article-title":"Hostapd structure","year":"0"}],"event":{"name":"2015 IEEE Conference on Communications and Network Security (CNS)","location":"Florence, Italy","start":{"date-parts":[[2015,9,28]]},"end":{"date-parts":[[2015,9,30]]}},"container-title":["2015 IEEE Conference on Communications and Network Security (CNS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7336674\/7346791\/07346809.pdf?arnumber=7346809","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T14:16:58Z","timestamp":1602685018000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7346809"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/cns.2015.7346809","relation":{},"subject":[],"published":{"date-parts":[[2015,9]]}}}