{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:41:56Z","timestamp":1750308116897,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":3,"publisher":"ACM","license":[{"start":{"date-parts":[[2005,10,10]],"date-time":"2005-10-10T00:00:00Z","timestamp":1128902400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2005,10,10]]},"DOI":"10.1145\/1089803.1090000","type":"proceedings-article","created":{"date-parts":[[2005,11,7]],"date-time":"2005-11-07T17:34:39Z","timestamp":1131384879000},"page":"260-261","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["DRKH"],"prefix":"10.1145","author":[{"given":"Ahmad M.","family":"Kholaif","sequence":"first","affiliation":[{"name":"McMaster University, Hamilton, Canada"}]},{"given":"Magda B.","family":"Fayek","sequence":"additional","affiliation":[{"name":"Cairo University, Cairo, Egypt"}]},{"given":"Hussein S.","family":"Eissa","sequence":"additional","affiliation":[{"name":"Cairo University, Cairo, Egypt"}]},{"given":"Hoda A.","family":"Baraka","sequence":"additional","affiliation":[{"name":"Cairo University, Cairo, Egypt"}]}],"member":"320","published-online":{"date-parts":[[2005,10,10]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Wireless Medium Access Control (MAC) and physical layer (PHY) specifications: MAC Security Enhancements","author":"Telecommunications Draft Amendment","year":"2003","unstructured":"Draft Amendment to Standard for Telecommunications and Information Exchange Between Systems -- LAN\/MAN Specific Requirements -- Part 11 : Wireless Medium Access Control (MAC) and physical layer (PHY) specifications: MAC Security Enhancements , IEEE Std . 802.11i\/D7.0, Oct. 2003 . Draft Amendment to Standard for Telecommunications and Information Exchange Between Systems -- LAN\/MAN Specific Requirements -- Part 11: Wireless Medium Access Control (MAC) and physical layer (PHY) specifications: MAC Security Enhancements, IEEE Std. 802.11i\/D7.0, Oct. 2003."},{"key":"e_1_3_2_1_2_1","first-page":"11","volume":"80","author":"Key Alternate Temporal","unstructured":"Housley, Russ; Whiting, Doug; and Ferguson, Niels. Alternate Temporal Key Hash ' IEEE 80 2. 11 - 02 \/282r2', 2001. Housley, Russ; Whiting, Doug; and Ferguson, Niels. Alternate Temporal Key Hash 'IEEE 802.11-02\/282r2', 2001.","journal-title":"IEEE"},{"key":"e_1_3_2_1_3_1","volume-title":"Wireless LAN medium access control (MAC) and physical layer (PHY) specifications","author":"LAN MAN Standards Committee of the IEEE Computer Society.","year":"1999","unstructured":"LAN MAN Standards Committee of the IEEE Computer Society. Wireless LAN medium access control (MAC) and physical layer (PHY) specifications . IEEE Standard 802.11, 1999 Edition , 1999. LAN MAN Standards Committee of the IEEE Computer Society. Wireless LAN medium access control (MAC) and physical layer (PHY) specifications. IEEE Standard 802.11, 1999 Edition, 1999."}],"event":{"name":"MSWiM05: 8th International Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems 2005","sponsor":["ACM Association for Computing Machinery","SIGSIM ACM Special Interest Group on Simulation and Modeling"],"location":"Montreal Quebec Canada","acronym":"MSWiM05"},"container-title":["Proceedings of the 2nd ACM international workshop on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1089803.1090000","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1089803.1090000","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:08:16Z","timestamp":1750262896000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1089803.1090000"}},"subtitle":["dynamic re-keying with key hopping"],"short-title":[],"issued":{"date-parts":[[2005,10,10]]},"references-count":3,"alternative-id":["10.1145\/1089803.1090000","10.1145\/1089803"],"URL":"https:\/\/doi.org\/10.1145\/1089803.1090000","relation":{},"subject":[],"published":{"date-parts":[[2005,10,10]]},"assertion":[{"value":"2005-10-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}