{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T10:07:53Z","timestamp":1730282873412,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,11]]},"DOI":"10.1109\/milcom.2011.6127468","type":"proceedings-article","created":{"date-parts":[[2012,3,1]],"date-time":"2012-03-01T11:34:31Z","timestamp":1330601671000},"page":"1225-1230","source":"Crossref","is-referenced-by-count":1,"title":["Control channel hopping for avoidance of scrambling attacks in IEEE 802.16 systems"],"prefix":"10.1109","author":[{"family":"Junwoo Jung","sequence":"first","affiliation":[]},{"family":"Jaemin Jeung","sequence":"additional","affiliation":[]},{"family":"Jaesung Lim","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"19","DOI":"10.1155\/2009\/361063"},{"year":"0","key":"22"},{"year":"2005","journal-title":"Specifications for 2 3GHz Band Portable Internet Service - Physical & Medium Access Control Layer","key":"17"},{"doi-asserted-by":"publisher","key":"18","DOI":"10.1109\/ACSSC.2001.987663"},{"doi-asserted-by":"publisher","key":"15","DOI":"10.1109\/TNET.2010.2068576"},{"year":"2006","journal-title":"Part 16 Air Interface for Fixed and Mobile Broadband Wireless Access Systems - Amendment 2 Physical and Medium Access Control Layers for Combined Fixed and Mobile Operation in Licensed Bands","key":"16"},{"doi-asserted-by":"publisher","key":"13","DOI":"10.1145\/1514274.1514299"},{"doi-asserted-by":"publisher","key":"14","DOI":"10.1109\/MNET.2011.5687950"},{"doi-asserted-by":"publisher","key":"11","DOI":"10.1109\/ISIT.2007.4557594"},{"doi-asserted-by":"publisher","key":"12","DOI":"10.1109\/PIMRC.2007.4394778"},{"doi-asserted-by":"publisher","key":"21","DOI":"10.1155\/2009\/263695"},{"doi-asserted-by":"publisher","key":"3","DOI":"10.1109\/WAINA.2008.190"},{"doi-asserted-by":"publisher","key":"20","DOI":"10.1109\/WCNC.2005.1424668"},{"doi-asserted-by":"publisher","key":"2","DOI":"10.1145\/1089761.1089764"},{"year":"2007","author":"andrews","journal-title":"Fundamentals of WiMAX Understanding Broadband Wireless Networking","key":"1"},{"doi-asserted-by":"publisher","key":"10","DOI":"10.1109\/WOWMOM.2009.5282482"},{"doi-asserted-by":"publisher","key":"7","DOI":"10.5120\/1095-1431"},{"key":"6","article-title":"Analysis of mobile WiMax security: Vulnerabilities and solutions","author":"han","year":"0","journal-title":"Proc Int'l Conf Mobile Ad-hoc and Sensor Systems Sep 2008"},{"key":"5","article-title":"Security vulnerabilities and solutions in mobile WiMax","volume":"7","author":"deininger","year":"2007","journal-title":"International Journal of Computer Science and Network Security"},{"year":"2001","author":"anderson","journal-title":"Security Engineering A Guide to Building Dependable Distrubted Systems","key":"4"},{"doi-asserted-by":"publisher","key":"9","DOI":"10.1109\/MILCOM.2006.302256"},{"year":"2006","author":"husso","journal-title":"Performance Analysis of A WiMax System under Jamming","key":"8"}],"event":{"name":"MILCOM 2011 - 2011 IEEE Military Communications Conference","start":{"date-parts":[[2011,11,7]]},"location":"Baltimore, MD, USA","end":{"date-parts":[[2011,11,10]]}},"container-title":["2011 - MILCOM 2011 Military Communications Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6111660\/6127424\/06127468.pdf?arnumber=6127468","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T10:40:08Z","timestamp":1490092808000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6127468\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,11]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/milcom.2011.6127468","relation":{},"subject":[],"published":{"date-parts":[[2011,11]]}}}