{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T16:16:32Z","timestamp":1730304992743,"version":"3.28.0"},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,11]]},"DOI":"10.1109\/wcsp.2011.6096780","type":"proceedings-article","created":{"date-parts":[[2011,12,15]],"date-time":"2011-12-15T22:02:53Z","timestamp":1323986573000},"page":"1-4","source":"Crossref","is-referenced-by-count":6,"title":["Weakness in 802.11w and an improved mechanism on protection of management frame"],"prefix":"10.1109","author":[{"given":"Weijia","family":"Wang","sequence":"first","affiliation":[]},{"given":"Haihang","family":"Wang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","article-title":"Using the fluhrer,mantin, and shamir attack to break wep","author":"stubblefield","year":"2001","journal-title":"AT&T Labs Technical Report"},{"key":"2","article-title":"Practical defence against wep and wpapsk attack for wlan","author":"ying wang","year":"2010","journal-title":"Wireless Communications Networking and Mobile Computing (WiCOM) 2010 6th International Conference on"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/IFITA.2010.288"},{"journal-title":"IEEE Standard 802 11 1999","year":"1999","key":"1"},{"journal-title":"IEEE Standard 208 11w-2007","year":"2009","key":"7"},{"key":"6","article-title":"Security analysis and improvements for ieee 802.11i","author":"he","year":"0","journal-title":"12th Annual Network and Distributed System Security"},{"key":"5","article-title":"Attack analysis of 4-way handshake protocol based on 802.1li","volume":"35","author":"cao li","year":"2009","journal-title":"Eng Comput"},{"journal-title":"IEEE Standard 802 11i-2004","year":"2004","key":"4"},{"key":"9","first-page":"1","article-title":"A lightweight solution for defending against deauthentication\/ disassociation attacks on 802.11 networks","author":"thuc","year":"2008","journal-title":"Computer Communications and Networks 2008 ICCCN '08 Proceedings of 17th International Conference"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/ICEEE.2005.1529571"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2008.ECP.365"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/AICT.2008.54"}],"event":{"name":"Signal Processing (WCSP 2011)","start":{"date-parts":[[2011,11,9]]},"location":"Nanjing, China","end":{"date-parts":[[2011,11,11]]}},"container-title":["2011 International Conference on Wireless Communications and Signal Processing (WCSP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6093625\/6096676\/06096780.pdf?arnumber=6096780","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T12:45:29Z","timestamp":1490100329000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6096780\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,11]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/wcsp.2011.6096780","relation":{},"subject":[],"published":{"date-parts":[[2011,11]]}}}