{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T13:10:20Z","timestamp":1744204220017,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,5]]},"DOI":"10.1109\/icc.2010.5502322","type":"proceedings-article","created":{"date-parts":[[2010,7,12]],"date-time":"2010-07-12T10:22:30Z","timestamp":1278930150000},"page":"1-6","source":"Crossref","is-referenced-by-count":45,"title":["Selective Jamming Attacks in Wireless Networks"],"prefix":"10.1109","author":[{"given":"A.","family":"Proano","sequence":"first","affiliation":[]},{"given":"L.","family":"Lazos","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/359460.359473"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/961268.961277"},{"key":"ref12","article-title":"Jamming-resistant broadcast communication without shared keys","author":"p\u00f6pper","year":"2009","journal-title":"Proceedings of the USENIX Security Symposium"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"210","DOI":"10.1007\/BFb0052348","article-title":"All-or-nothing encryption and the package transform","author":"rivest","year":"1997","journal-title":"Lecture Notes in Computer Science"},{"journal-title":"Time-lock puzzles and timed-release Crypto","year":"1996","author":"rivest","key":"ref14"},{"journal-title":"Spread Spectrum Communications Handbook","year":"1994","author":"simon","key":"ref15"},{"journal-title":"Cryptography Theory and Practice","year":"2006","author":"stinson","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC.2007.4394778"},{"key":"ref18","article-title":"Intelligent jamming in wireless networks with applications to 802.11 b and other networks","author":"thuente","year":"2006","journal-title":"Proceedings of the IEEE MILCOM"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1062689.1062697"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2007.4557594"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2005.1610548"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1007\/3-540-48969-X_3","article-title":"Commitment schemes and zero-knowledge protocols","volume":"1561","author":"damgard","year":"1999","journal-title":"Lecture Notes in Computer Science"},{"journal-title":"Internetworking with TCP\/IP Principles Protocols and Architecture","year":"2006","author":"comer","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1464420.1464426"},{"key":"ref7","first-page":"151","article-title":"Client puzzles: A cryptographic countermeasure against connection depletion attacks","author":"juels","year":"1999","journal-title":"Proc Symp Network and Distributed System Security"},{"year":"2007","key":"ref2"},{"journal-title":"OPNET Modeler 14 5","year":"0","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1514274.1514299"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1023646.1023661"}],"event":{"name":"ICC 2010 - 2010 IEEE International Conference on Communications","start":{"date-parts":[[2010,5,23]]},"location":"Cape Town, South Africa","end":{"date-parts":[[2010,5,27]]}},"container-title":["2010 IEEE International Conference on Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5497983\/5501741\/05502322.pdf?arnumber=5502322","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T06:43:05Z","timestamp":1497854585000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5502322\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,5]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/icc.2010.5502322","relation":{},"subject":[],"published":{"date-parts":[[2010,5]]}}}