{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T03:35:08Z","timestamp":1725680108961},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,10]]},"DOI":"10.1109\/lcn.2009.5355042","type":"proceedings-article","created":{"date-parts":[[2009,12,24]],"date-time":"2009-12-24T13:26:49Z","timestamp":1261661209000},"page":"930-936","source":"Crossref","is-referenced-by-count":8,"title":["A frame handler module for a side-channel in mobile ad hoc networks"],"prefix":"10.1109","author":[{"given":"Marvin","family":"Odor","sequence":"first","affiliation":[]},{"given":"Babak","family":"Nasri","sequence":"additional","affiliation":[]},{"given":"Mazda","family":"Salmanian","sequence":"additional","affiliation":[]},{"given":"Peter C.","family":"Mason","sequence":"additional","affiliation":[]},{"given":"Miguel Vargas","family":"Martin","sequence":"additional","affiliation":[]},{"given":"Ramiro","family":"Liscano","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Cryptography Theory and Practice","year":"2006","author":"stinson","key":"ref4"},{"journal-title":"Covert Channel Vulnerabilities in Anonymity Systems","year":"2007","author":"murdoch","key":"ref3"},{"key":"ref10","article-title":"A Confidential Wireless Channel for Side-Channel Communication in MANETs, Poster in the","author":"odor","year":"2009","journal-title":"30th IEEE Symposium on Security and Privacy"},{"journal-title":"Network Covert Channels Subversive Secrecy As part of the Information Security Reading Room","year":"2006","author":"sbrusch","key":"ref6"},{"journal-title":"On the Design of Network-Based Covert Communication Systems","year":"2007","author":"smith","key":"ref11"},{"journal-title":"IEEE Standard for information technology-Telecommunications and information exchange between systems-Local and metropolitan area networks-Specific requirements-Part 11 Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications Amendment 6 Medium Access Control (MAC) Security Enhancements","year":"2004","key":"ref5"},{"journal-title":"MATLAB Compute hash using MD 2 MD 5 SHA-l SHA-256 SHA-384 and SHA-512","year":"0","key":"ref12"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2004.1311885"},{"journal-title":"SoftMAC _ Flexible Wireless Research Platform","year":"2005","author":"neufeld","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICPADS.2005.243"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2002.1028931"},{"key":"ref1","first-page":"31","article-title":"HICCUPS: Hidden Communication System for Corrupted Networks","author":"szczypiorski","year":"0","journal-title":"The Tenth International Multi-Conference on Advanced Computer Systems"}],"event":{"name":"2009 IEEE 34th Conference on Local Computer Networks (LCN 2009)","start":{"date-parts":[[2009,10,20]]},"location":"Zurich, Switzerland","end":{"date-parts":[[2009,10,23]]}},"container-title":["2009 IEEE 34th Conference on Local Computer Networks"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5347306\/5354999\/05355042.pdf?arnumber=5355042","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,18]],"date-time":"2017-03-18T20:51:56Z","timestamp":1489870316000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5355042\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,10]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/lcn.2009.5355042","relation":{},"subject":[],"published":{"date-parts":[[2009,10]]}}}