{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T02:24:51Z","timestamp":1729650291564,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,12]]},"DOI":"10.1109\/icitst.2013.6750227","type":"proceedings-article","created":{"date-parts":[[2014,3,27]],"date-time":"2014-03-27T15:20:46Z","timestamp":1395933646000},"page":"382-387","source":"Crossref","is-referenced-by-count":5,"title":["Analysing and attacking the 4-way handshake of IEEE 802.11i standard"],"prefix":"10.1109","author":[{"given":"Abdullah","family":"Alabdulatif","sequence":"first","affiliation":[]},{"given":"Xiaoqi","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Lars","family":"Nolle","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","article-title":"Security analysis and improvements for ieee802 11i","author":"he","year":"2005","journal-title":"Network and Distributed System Security Symposium (NDSS'05)"},{"key":"16","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1155\/WCN\/2006\/47453","article-title":"Static and dynamic 4-way handshake solutions to avoid denial of service attack in wi-fi protected access and ieee 802. 11 i","volume":"2006","author":"rango","year":"2006","journal-title":"EURASIP Journal on Wireless Communications and Networking"},{"key":"13","article-title":"Denial of service in public key protocols","author":"eronen","year":"2000","journal-title":"Proceedings of the Helsinki University of Technology Seminar on Network Security (Fall) Citeseer 2000"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/1023646.1023655"},{"key":"11","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-68136-6","author":"bella","year":"2007","journal-title":"Formal Correctness of Security Protocols"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/322510.322530"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/ICCS.2010.5686489"},{"key":"2","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1145\/1102120.1102124","article-title":"A modular correctness proof of ieee 802 11 i and tls","author":"he","year":"2005","journal-title":"Proceedings of the 12th ACM Conference on Computer and Communications Security ACM"},{"key":"1","first-page":"324","article-title":"Verifying and fixing password authentication protocol","author":"ma","year":"2006","journal-title":"Software Engineering Artificial Intelligence Networking and Parallel\/ Distributed Computing 2006 SNPD 2006 Seventh ACIS International Conference On IEEE"},{"journal-title":"Real 802 11 Security Wi-Fi Protected Access and 802","year":"2004","author":"edney","key":"10"},{"key":"7","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-09527-0","author":"boyd","year":"2003","journal-title":"Protocols for Authentication and Key Establishment"},{"key":"6","first-page":"749","article-title":"A framework for proving the correctness of cryptographic protocol properties by linear temporal logic","volume":"4","author":"alabdulatif","year":"2013","journal-title":"International Journal of Digital Society (IJDS)"},{"key":"5","first-page":"525","article-title":"A framework for cryptographic protocol analysis using linear temporal logic","author":"alabdulatif","year":"2012","journal-title":"2012 International Conference on Information Society (I-Society)"},{"key":"4","first-page":"23","article-title":"Formal analysis of authentication in 802 11 i","volume":"1","author":"dong","year":"2009","journal-title":"Journal of Shanghai Jiaotong University (Science)"},{"journal-title":"Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications Amendment 6 Medium Access Control (MAC) Security Enhancements","article-title":"IEEE standard for information technology-telecommunications and information exchange between systemslocal and metropolitan area networks-specific requirements part 11","year":"2004","key":"9"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2008.ECP.365"}],"event":{"name":"2013 8th International Conference for Internet Technology and Secured Transactions (ICITST)","start":{"date-parts":[[2013,12,9]]},"location":"London, United Kingdom","end":{"date-parts":[[2013,12,12]]}},"container-title":["8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6745432\/6750143\/06750227.pdf?arnumber=6750227","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,9]],"date-time":"2019-08-09T00:08:03Z","timestamp":1565309283000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6750227\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/icitst.2013.6750227","relation":{},"subject":[],"published":{"date-parts":[[2013,12]]}}}