{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T15:43:08Z","timestamp":1729611788385,"version":"3.28.0"},"reference-count":9,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,1]]},"DOI":"10.1109\/comswa.2008.4554449","type":"proceedings-article","created":{"date-parts":[[2008,7,3]],"date-time":"2008-07-03T15:19:59Z","timestamp":1215098399000},"page":"409-414","source":"Crossref","is-referenced-by-count":0,"title":["Fuzzy based dynamic WEP keymanagement for WLAN security enhancement"],"prefix":"10.1109","author":[{"given":"S.","family":"Chandramathi","sequence":"first","affiliation":[]},{"given":"K.V.","family":"Arunkumar","sequence":"additional","affiliation":[]},{"given":"S.","family":"Deivarayan","sequence":"additional","affiliation":[]},{"given":"P.","family":"Sendhilkumar","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-45537-X_1","article-title":"Weaknesses in the key scheduling algorithm of RC4","author":"fluhrer","year":"2001","journal-title":"Eighth Annual Workshop on Selected Areas in Cryptography"},{"year":"0","key":"ref3"},{"key":"ref6","article-title":"An Inductive Chosen Plaintext Attack Against WEP\/WEP2","author":"arbaugh","year":"2004","journal-title":"IEEE Document 802 11&#x2013;02\/230"},{"journal-title":"AES Algorithm (Riindael)","year":"0","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/91.995119"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/0165-0114(94)90311-5"},{"key":"ref2","article-title":"Unsafe at any key size: an analysis of the WEP encapsulation","author":"walker","year":"2005","journal-title":"Tech Rep 03628E IEEE 802 11 committee"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1016\/S1568-4946(03)00005-X","article-title":"Dynamic Bandwidth allocation for heterogeneous sources in ATM networks","volume":"3","author":"chandramathi","year":"2003","journal-title":"Applied Soft Computing Journal"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SARNOF.2004.1302861"}],"event":{"name":"Middleware and Workshops (COMSWARE '08)","start":{"date-parts":[[2008,1,6]]},"location":"Bangalore, India","end":{"date-parts":[[2008,1,10]]}},"container-title":["2008 3rd International Conference on Communication Systems Software and Middleware and Workshops (COMSWARE '08)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4545865\/4554360\/04554449.pdf?arnumber=4554449","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,12]],"date-time":"2019-05-12T13:18:55Z","timestamp":1557667135000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4554449\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,1]]},"references-count":9,"URL":"https:\/\/doi.org\/10.1109\/comswa.2008.4554449","relation":{},"subject":[],"published":{"date-parts":[[2008,1]]}}}