{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T15:40:10Z","timestamp":1742398810253},"reference-count":19,"publisher":"IEEE","license":[{"start":{"date-parts":[[2009,4,1]],"date-time":"2009-04-01T00:00:00Z","timestamp":1238544000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2009,4,1]],"date-time":"2009-04-01T00:00:00Z","timestamp":1238544000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,4]]},"DOI":"10.1109\/infcom.2009.5062118","type":"proceedings-article","created":{"date-parts":[[2009,6,3]],"date-time":"2009-06-03T15:10:14Z","timestamp":1244041814000},"page":"1962-1970","source":"Crossref","is-referenced-by-count":11,"title":["Fundamental Limits on Secure Clock Synchronization and Man-In-The-Middle Detection in Fixed Wireless Networks"],"prefix":"10.1109","author":[{"given":"J. T.","family":"Chiang","sequence":"first","affiliation":[{"name":"Dept. of Electr. & Comput. Eng., Univ. of Illinois at Urbana-Champaign, Champaign, IL"}]},{"given":"J. J.","family":"Haas","sequence":"additional","affiliation":[{"name":"Dept. of Electr. & Comput. Eng., Univ. of Illinois at Urbana-Champaign, Champaign, IL"}]},{"given":"Y. C.","family":"Hu","sequence":"additional","affiliation":[{"name":"Dept. of Electr. & Comput. Eng., Univ. of Illinois at Urbana-Champaign, Champaign, IL"}]},{"given":"P. R.","family":"Kumar","sequence":"additional","affiliation":[{"name":"Dept. of Electr. & Comput. Eng., Univ. of Illinois at Urbana-Champaign, Champaign, IL"}]},{"given":"J.","family":"Choi","sequence":"additional","affiliation":[{"name":"Dept. of Electr. & Comput. Eng., Univ. of Illinois at Urbana-Champaign, Champaign, IL"}]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2005.1467974"},{"key":"17","article-title":"wimax ready for prime time","author":"dropping","year":"2007","journal-title":"Wireless Design & Development"},{"key":"18","first-page":"114","article-title":"leos-the communications satellites of the 21st century","author":"sturza","year":"1996","journal-title":"Proc Northcon'96"},{"year":"0","key":"15"},{"journal-title":"WCDMA for UMTS Radio Access for Third Generation Mobile Communications","year":"2004","author":"holma","key":"16"},{"journal-title":"Error bounds and consistency of maximum likelihood time synchronization","year":"2008","author":"scheuermann","key":"13"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1982.1095533"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.21"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2006.320200"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/SAINTW.2003.1210190"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2004.1429378"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2007.4434546"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-006-3723-x"},{"key":"7","first-page":"131","article-title":"using directional antennas to prevent wormhole attacks","author":"hu","year":"2004","journal-title":"Proc the 11th Network and Distributed System Security Symposium (NDSS'04)"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/986858.986862"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1209219"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2002.1181388"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/SECCOMW.2006.359564"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2005.58"}],"event":{"name":"2009 Proceedings IEEE INFOCOM","start":{"date-parts":[[2009,4,19]]},"location":"Rio de Janeiro, Brazil","end":{"date-parts":[[2009,4,25]]}},"container-title":["IEEE INFOCOM 2009"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5061887\/5061888\/05062118.pdf?arnumber=5062118","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,3,2]],"date-time":"2023-03-02T18:23:16Z","timestamp":1677781396000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/5062118\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,4]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/infcom.2009.5062118","relation":{},"subject":[],"published":{"date-parts":[[2009,4]]}}}