{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T09:53:33Z","timestamp":1725530013252},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,11]]},"DOI":"10.1109\/milcom.2011.6127470","type":"proceedings-article","created":{"date-parts":[[2012,3,1]],"date-time":"2012-03-01T11:34:31Z","timestamp":1330601671000},"page":"1237-1242","source":"Crossref","is-referenced-by-count":4,"title":["Timely and robust key establishment under jamming attack in critical wireless networks"],"prefix":"10.1109","author":[{"given":"Eun-Kyu","family":"Lee","sequence":"first","affiliation":[]},{"given":"Soon Y.","family":"Oh","sequence":"additional","affiliation":[]},{"given":"Mario","family":"Gerla","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/1023646.1023661"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/1530748.1530778"},{"key":"16","article-title":"Jamming-resistant key establishment using uncoordinated frequency hopping","author":"strasser","year":"0","journal-title":"IEEE Symposium on Security and Privacy 2008"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2010.100608"},{"journal-title":"Wireless Communications Principles and Practice","year":"2001","author":"rappaport","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.314"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/961268.961277"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/1614320.1614324"},{"key":"2","article-title":"Ssch: Slotted seeded channel hopping for capacity improvement in ieee 802.11 ad-hoc wireless networks","author":"bahl","year":"2004","journal-title":"ACM MOBICOM"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/1555816.1555842"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539795281232"},{"key":"7","article-title":"Link-layer jamming attacks on s-mac","author":"law","year":"0","journal-title":"European Workshop on Wireless Sensor Networks (EWSN) 2005"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1023\/B:MONE.0000048553.45798.5e"},{"journal-title":"Wireless MAC and PHY Specifications for Wireless Personal Area Networks (WPANs)","year":"2005","key":"5"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/1282427.1282424"},{"key":"9","article-title":"Two new quorum based algorithms for distributed mutual exclusion","author":"luk","year":"0","journal-title":"IEEE International Conference on Distributed Computing Systems (ICDCS) 1997"},{"journal-title":"Fast and Resilient Key Establishment Using Quorum Rendezvous under Jamming Attack","year":"2011","author":"lee","key":"8"}],"event":{"name":"MILCOM 2011 - 2011 IEEE Military Communications Conference","start":{"date-parts":[[2011,11,7]]},"location":"Baltimore, MD, USA","end":{"date-parts":[[2011,11,10]]}},"container-title":["2011 - MILCOM 2011 Military Communications Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6111660\/6127424\/06127470.pdf?arnumber=6127470","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T10:41:27Z","timestamp":1490092887000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6127470\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,11]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/milcom.2011.6127470","relation":{},"subject":[],"published":{"date-parts":[[2011,11]]}}}