{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T20:16:10Z","timestamp":1729628170939,"version":"3.28.0"},"reference-count":35,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,6]]},"DOI":"10.1109\/wowmom.2010.5534940","type":"proceedings-article","created":{"date-parts":[[2010,8,9]],"date-time":"2010-08-09T22:19:00Z","timestamp":1281392340000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["Assessment of the true risks to the protection of confidential information in the wireless home and office environment"],"prefix":"10.1109","author":[{"given":"Michel","family":"Barbeau","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/997122.997132"},{"journal-title":"cowpatty main","year":"0","key":"ref32"},{"key":"ref31","first-page":"386","article-title":"The final nail in WE, s coffin","author":"bittau","year":"0","journal-title":"Proceedings of the 2006 IEEE Symposium on Security and Privacy May 2006"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/1514274.1514286"},{"key":"ref35","article-title":"Security in residential wireless local area networks","author":"relyea","year":"2008","journal-title":"Tech Rep"},{"journal-title":"Security of BlackBerry pin-to-pin messaging","year":"2008","key":"ref34"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CSE.2009.178"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/3-540-45537-X_1","article-title":"Weaknesses in the key scheduling algorithm of RC4","volume":"2259","author":"fluhrer","year":"2001","journal-title":"Selected Areas in Cryptography Ser Lecture Notes in Computer Science"},{"key":"ref12","first-page":"17","article-title":"Using the Fluhrer, Mantin and Shamir attack to break WEP","author":"stubblefield","year":"2002","journal-title":"Network System Security Symposium"},{"journal-title":"Operational security standard Management of information technology security (MITS)","year":"2004","key":"ref13"},{"journal-title":"Security policy-manager's handbook","year":"1996","key":"ref14"},{"journal-title":"Wireshark","year":"2010","key":"ref15"},{"journal-title":"Aircrack-ng","year":"2010","key":"ref16"},{"journal-title":"iStumbler","year":"2010","key":"ref17"},{"journal-title":"MacStumbler","year":"2010","key":"ref18"},{"journal-title":"KisMAC","year":"2010","key":"ref19"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/769800.769822"},{"journal-title":"European Telecommunications Standards Institute (ETSI) Tech Rep Technical Specification ETSI TS 102 165&#x2013;1 V4 1 1","article-title":"Telecommunications and internet protocol harmonization over networks (TIPHON) release 4; protocol framework definition; methods and protocols for security; part 1: Threat analysis","year":"2003","key":"ref4"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/769800.769823"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0811973106"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"266","DOI":"10.1007\/11814764_22","article-title":"Threats to security in DSRC\/WAVE","volume":"4104","author":"laurendeau","year":"2006","journal-title":"5th International Conference on Ad-hoc Networks Lecture Notes in Computer Science"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2005.241"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1007\/11801412_8","article-title":"Detecting impersonation attacks in future wireless and mobile networks","volume":"4074","author":"barbeau","year":"2006","journal-title":"Lecture Notes in Computer Science Mobile Ad-hoc and Sensor Networks"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CNSR.2008.69"},{"key":"ref7","first-page":"347","article-title":"Analysis of threats to WiMAX\/802.16 security","author":"barbeau","year":"2007","journal-title":"Mobile WiMAX Toward Broadband Wireless Metropolitan Area Networks ser Wireless Networks and Mobile Communications Series"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1109\/MSP.2007.43","article-title":"Studying Bluetooth malware propagation: The BlueBag project","volume":"5","author":"zanero","year":"2007","journal-title":"IEEE Security and Privacy"},{"journal-title":"Integrated risk management framework (IRMF)","year":"2001","key":"ref9"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2009.142"},{"journal-title":"Kismet","year":"0","key":"ref20"},{"key":"ref22","first-page":"129","article-title":"Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses","author":"halperin","year":"2008","journal-title":"IEEE Symposium on Security and Privacy"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1002\/9780470512494"},{"key":"ref24","first-page":"1","article-title":"BlueSniff: Eve meets Alice and Bluetooth","author":"spill","year":"2007","journal-title":"WOOT '07 Proceedings of the first USENIX workshop on Offensive Technologies"},{"journal-title":"The A5 cracking project - practical attacks on GSM using GNU radio and FPGAs - chaos communication camp 2007","year":"2007","author":"lackey","key":"ref23"},{"journal-title":"Tech Rep DECTR-506","article-title":"The wireless security survey of London","year":"2008","key":"ref26"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1658939.1658968"}],"event":{"name":"2010 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)","start":{"date-parts":[[2010,6,14]]},"location":"Montreal, QC, Canada","end":{"date-parts":[[2010,6,17]]}},"container-title":["2010 IEEE International Symposium on \"A World of Wireless, Mobile and Multimedia Networks\" (WoWMoM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5513765\/5534887\/05534940.pdf?arnumber=5534940","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T13:58:07Z","timestamp":1559397487000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5534940\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,6]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/wowmom.2010.5534940","relation":{},"subject":[],"published":{"date-parts":[[2010,6]]}}}