{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T15:20:02Z","timestamp":1729610402577,"version":"3.28.0"},"reference-count":42,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/pccc.2004.1395170","type":"proceedings-article","created":{"date-parts":[[2005,2,22]],"date-time":"2005-02-22T20:29:50Z","timestamp":1109104190000},"page":"739-745","source":"Crossref","is-referenced-by-count":0,"title":["The interaction of security and survivability in hybrid wireless networks"],"prefix":"10.1109","author":[{"given":"K.","family":"Krishnamurthy","sequence":"first","affiliation":[]},{"given":"D.","family":"Tipper","sequence":"additional","affiliation":[]},{"given":"Y.","family":"Qian","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","article-title":"Survivability Analysis for Mobile Cellular Networks","author":"tipper","year":"2002","journal-title":"Proc of CNDS 2002"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/49.265703"},{"journal-title":"TR 33 102","article-title":"3GPP security architecture","year":"1999","key":"ref33"},{"journal-title":"3GPP Technical Specification Group Services and Systems Aspects","article-title":"An example algorithm set for the 3GPP authentication and key generation functions","year":"2001","key":"ref32"},{"journal-title":"3GPP Technical Specification Group Services and Systems Aspects","article-title":"Specification of the 3GPP Confidentiality and Integrity Algorithms","year":"2001","key":"ref31"},{"key":"ref30","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-45537-X_1","article-title":"Weaknesses in key scheduling algorithm of RC4","author":"fluhrer","year":"2001","journal-title":"Eighth Annual Workshop on Selected Areas in Cryptography"},{"key":"ref37","article-title":"A Wireless Information Assurance Architecture","author":"krishnamurthy","year":"2001","journal-title":"Proc IST Mobile Communications Summit 2001"},{"key":"ref36","article-title":"IEEE 802.11 Security and 802.1X","author":"simon","year":"2000","journal-title":"IEEE 802 11 WG Document doc IEEE 802 11-00\/034rI"},{"key":"ref35","article-title":"An initial security analysis of the IEEE 802.1X Standard","author":"mishra","year":"2002","journal-title":"University of Maryland Technical Report CS-TR-4328"},{"journal-title":"The IEEE 802 11 Task Group I Reports","year":"0","key":"ref34"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/65.660007"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/98.556475"},{"key":"ref11","first-page":"887","article-title":"Demand Re-registion for PCS Database Restoration","volume":"2","author":"hess","year":"1999","journal-title":"Proceedings Of IEEE Mikom 99"},{"key":"ref12","doi-asserted-by":"crossref","DOI":"10.1023\/A:1009008301727","article-title":"implicit Deregistration with forced registration for PCS Mobility Management","volume":"7","author":"pang","year":"2001","journal-title":"Wireless Netw"},{"key":"ref13","first-page":"88","article-title":"Survivable Mobile Phone Network Architectures: Models and Solution Metbods","author":"alcvr","year":"1998","journal-title":"IEEE Comm Mag"},{"key":"ref14","first-page":"58","article-title":"Desigo of (tialty Survivable Network for Cellular Tetecommunication","author":"dutta","year":"0","journal-title":"European Journal of Operational Research"},{"key":"ref15","article-title":"Recent Trends in Reliable Access Networking for GSM SySstems","author":"hilt","year":"2001","journal-title":"Proc Int Workshop on Design of Reliable Communication Networks"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/2.869370"},{"key":"ref17","article-title":"Designing Survivable Wireless and Mobile Networks","author":"versbney","year":"1999","journal-title":"Proceedings of IEEE WCNC'99"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/49.634791"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.1999.796827"},{"key":"ref28","doi-asserted-by":"crossref","DOI":"10.1007\/BFb0052260","article-title":"Cryptanalysis of the cellular message encryption algorithm","author":"wagner","year":"1997","journal-title":"Advances in Cryptology Crypto '97"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2002.1043861"},{"key":"ref27","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-45353-9_14","article-title":"Security weaknesses in Bluetooth","author":"jakobsson","year":"2001","journal-title":"Topics in Cryptology ? CT-RSA 2001"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/98.960335"},{"key":"ref6","article-title":"Recovery in Wireless and Mobile Communication Systems","author":"bruteh","year":"1998","journal-title":"IEEE Information Survtvability Workshop 1998 (lS'98)"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/98.589266"},{"journal-title":"British Telecom's OpenZone Service","year":"0","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/35.387551"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/BF01200853"},{"journal-title":"Infonnalion Assuranee Advisory Council","year":"0","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/242857.242878"},{"key":"ref1","article-title":"Handoff hybrid mobile data networks","author":"pahlavan","year":"2000","journal-title":"IEEE PersonalCommunications"},{"key":"ref20","article-title":"The Effects of Failures in PCS Networks","author":"shin","year":"2001","journal-title":"Proc DRC"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/35.978050"},{"key":"ref21","article-title":"Survivability Issues in Wireless Mobile Networks","author":"dahlberg","year":"1997","journal-title":"Proc Int Workshop Mobile Wireless Communications Networks"},{"journal-title":"The IST Safeguard Project","year":"0","key":"ref42"},{"journal-title":"Principles of Wireless Networks A Unified Approach","year":"2002","author":"pahlavan","key":"ref24"},{"journal-title":"The IST Caution Project","year":"0","key":"ref41"},{"journal-title":"Internet Security Protocols Protecting IP Traffic","year":"2000","author":"black","key":"ref23"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/98.403454"},{"journal-title":"Internetwork Mobility The CDPD Approach","year":"1997","author":"taylor","key":"ref25"}],"event":{"name":"2004 IEEE International Performance, Computing, and Communications Conference","acronym":"PCCC-04","location":"Phoenix, AZ, USA"},"container-title":["IEEE International Conference on Performance, Computing, and Communications, 2004"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9115\/28907\/01395170.pdf?arnumber=1395170","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,1,28]],"date-time":"2019-01-28T20:06:36Z","timestamp":1548705996000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1395170\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":42,"URL":"https:\/\/doi.org\/10.1109\/pccc.2004.1395170","relation":{},"subject":[]}}