{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T17:52:01Z","timestamp":1761933121675,"version":"build-2065373602"},"reference-count":16,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/icppw.2003.1240398","type":"proceedings-article","created":{"date-parts":[[2004,2,3]],"date-time":"2004-02-03T19:24:01Z","timestamp":1075836241000},"page":"425-431","source":"Crossref","is-referenced-by-count":7,"title":["Countering rogues in wireless networks"],"prefix":"10.1109","author":[{"given":"A.","family":"Godber","sequence":"first","affiliation":[]},{"given":"P.","family":"Dasgupta","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Nocat open authentication package","year":"0","key":"ref10"},{"journal-title":"Using the Fluhrer Mantin and Shamir attack to break WEP","year":"2001","author":"stubblefield","key":"ref11"},{"journal-title":"Opensource linux driver for Atmel AT76C503A-based wireless devices","year":"0","key":"ref12"},{"journal-title":"Wavelan security using ipsec","year":"0","key":"ref13"},{"journal-title":"Redfang - the bluetooth hunter","year":"0","author":"whitehouse","key":"ref14"},{"journal-title":"Detecting wireless LAN MAC address spoofing","year":"0","author":"wright","key":"ref15"},{"journal-title":"netsed","year":"0","author":"zalewski","key":"ref16"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/570681.570686"},{"key":"ref3","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-45537-X_1","article-title":"Weaknesses in the key scheduling algorithm of RC4","volume":"2259","author":"fluhrer","year":"2001","journal-title":"Lecture Notes in Computer Science"},{"journal-title":"parprouted Proxyarp routing daemon","year":"0","author":"ivaschenko","key":"ref6"},{"journal-title":"802 1X Port-Based Network Access Control","year":"0","key":"ref5"},{"journal-title":"Host AP driver for Intersil Prism2\/2 5\/3","year":"0","author":"malinen","key":"ref8"},{"journal-title":"Building Linux Virtual Private Networks","year":"2002","author":"kolesnikov","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/570681.570687"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2001.937274"},{"journal-title":"An Initial Security Analysis of the IEEE 802 1X Standard","year":"0","author":"mishra","key":"ref9"}],"event":{"name":"2003 International Conference on Parallel Processing Workshops","acronym":"ICPPW-03","location":"Kaohsiung, Taiwan"},"container-title":["2003 International Conference on Parallel Processing Workshops, 2003. Proceedings."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8781\/27812\/01240398.pdf?arnumber=1240398","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T03:26:39Z","timestamp":1497583599000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1240398\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/icppw.2003.1240398","relation":{},"subject":[]}}