{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,29]],"date-time":"2025-06-29T21:00:08Z","timestamp":1751230808376,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2006,9,28]]},"DOI":"10.1145\/1161289.1161297","type":"proceedings-article","created":{"date-parts":[[2006,10,18]],"date-time":"2006-10-18T22:04:00Z","timestamp":1161209040000},"page":"33-42","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":127,"title":["Securing wireless systems via lower layer enforcements"],"prefix":"10.1145","author":[{"given":"Zang","family":"Li","sequence":"first","affiliation":[{"name":"The State University of New Jersey, Piscataway, NJ"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Wenyuan","family":"Xu","sequence":"additional","affiliation":[{"name":"The State University of New Jersey, Piscataway, NJ"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Rob","family":"Miller","sequence":"additional","affiliation":[{"name":"The State University of New Jersey, Piscataway, NJ"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Wade","family":"Trappe","sequence":"additional","affiliation":[{"name":"The State University of New Jersey, Piscataway, NJ"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2006,9,28]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/381677.381695"},{"key":"e_1_3_2_1_2_1","first-page":"44","article-title":"Your 802.11 network has no clothes","author":"Mishra A.","year":"2002","unstructured":"A. Mishra , M. Shin , and W. A. Arbaugh , \" Your 802.11 network has no clothes ,\" IEEE Communications Magazine , pp. 44 -- 51 , 2002 . A. Mishra, M. Shin, and W. A. Arbaugh, \"Your 802.11 network has no clothes,\" IEEE Communications Magazine, pp. 44--51, 2002.","journal-title":"IEEE Communications Magazine"},{"key":"e_1_3_2_1_3_1","first-page":"526","article-title":"Cryptoanalysis of the cellular encryption algorithm,\" in Proceedings of the 17th Annual International Cryptology Conference on Advances","author":"Wagner D.","year":"1997","unstructured":"D. Wagner , B. Schneier . and J. Kelsey , \" Cryptoanalysis of the cellular encryption algorithm,\" in Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology , 1997 , pp. 526 -- 537 . D. Wagner, B. Schneier. and J. Kelsey, \"Cryptoanalysis of the cellular encryption algorithm,\" in Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology, 1997, pp. 526--537.","journal-title":"Cryptology"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/769800.769822"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/769800.769823"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511841224","volume-title":"Wireless Communications","author":"Goldsmith A.","year":"2005","unstructured":"A. Goldsmith , Wireless Communications , Cambridge University Press , 2005 . A. Goldsmith, Wireless Communications, Cambridge University Press, 2005."},{"key":"e_1_3_2_1_7_1","volume-title":"Microwave Mobile Communications","author":"Jakes W. C.","year":"1974","unstructured":"W. C. Jakes Jr . , Microwave Mobile Communications , Wiley , 1974 . W. C. Jakes Jr., Microwave Mobile Communications, Wiley, 1974."},{"key":"e_1_3_2_1_8_1","volume-title":"Introduction to Cryptography with Coding Theory","author":"Trappe W.","year":"2002","unstructured":"W. Trappe and L. C. Washington , Introduction to Cryptography with Coding Theory , Prentice Hall , 2002 . W. Trappe and L. C. Washington, Introduction to Cryptography with Coding Theory, Prentice Hall, 2002."},{"key":"e_1_3_2_1_9_1","volume-title":"Wireless Communications- Principles and Practice","author":"Rappaport T. S.","year":"2001","unstructured":"T. S. Rappaport , Wireless Communications- Principles and Practice , Prentice Hall , 2001 . T. S. Rappaport, Wireless Communications- Principles and Practice, Prentice Hall, 2001."},{"key":"e_1_3_2_1_10_1","volume-title":"Wireless Communications","author":"Molisch A. F.","year":"2005","unstructured":"A. F. Molisch , Ed., Wireless Communications , John Wiley and Sons , 2005 . A. F. Molisch, Ed., Wireless Communications, John Wiley and Sons, 2005."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2005.851606"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2003.812172"},{"volume-title":"July 27, 2003.","author":"V. Erceg","key":"e_1_3_2_1_13_1","unstructured":"V. Erceg et. al., \" Channel Models for Fized Wireless Applications ,\" IEEE 802. 16 Broadband Wireless Access Working Group , July 27, 2003. V. Erceg et. al., \"Channel Models for Fized Wireless Applications,\" IEEE 802.16 Broadband Wireless Access Working Group, July 27, 2003."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2000.841720"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/8.34144"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAP.1972.1140277"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/49.16841"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/990064.990081"},{"key":"e_1_3_2_1_20_1","volume-title":"Handbook of Applied Cryptography","author":"Menezes A.","year":"1997","unstructured":"A. Menezes , P. vanOorschot , and S. Vanstone , Handbook of Applied Cryptography , CRC Press , 1997 . A. Menezes, P. vanOorschot, and S. Vanstone, Handbook of Applied Cryptography, CRC Press, 1997."},{"key":"e_1_3_2_1_21_1","unstructured":"\"\n      Lecture\n     notes on cryptography \" \n      MIT\n      Summer Course available at http:\/\/www.cs.ucsd.edu\/users\/mihir\/papers\/gb.html 2001\n  .  \"Lecture notes on cryptography \" MIT Summer Course available at http:\/\/www.cs.ucsd.edu\/users\/mihir\/papers\/gb.html 2001."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(84)90070-9"},{"key":"e_1_3_2_1_23_1","first-page":"1355","article-title":"The wire-tap channel","volume":"54","author":"Wyner A. D.","year":"1975","unstructured":"A. D. Wyner , \" The wire-tap channel ,\" Bell Syst. Tech. Journal , vol. 54 , pp. 1355 -- 1387 , 1975 . A. D. Wyner, \"The wire-tap channel,\" Bell Syst. Tech. Journal, vol. 54, pp. 1355--1387, 1975.","journal-title":"Journal"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1978.1055892"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/129837"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/18.256484"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/103418.103476"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2003.809563"},{"key":"e_1_3_2_1_29_1","first-page":"267","volume-title":"Quantum cryptography, or unforgeable subway tokens,\" Advances in Cryptology: Crypto '82","author":"Bennett C. H.","year":"1982","unstructured":"C. H. Bennett , G. Brassard , S. Breidbart , and S. Wiesner , \" Quantum cryptography, or unforgeable subway tokens,\" Advances in Cryptology: Crypto '82 , p. 267 275, 1982 . C. H. Bennett, G. Brassard, S. Breidbart, and S. Wiesner, \"Quantum cryptography, or unforgeable subway tokens,\" Advances in Cryptology: Crypto '82, p. 267 275, 1982."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/24652.24654"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/26.385951"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1006\/dspr.1996.0023"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/4234.824754"},{"key":"e_1_3_2_1_34_1","first-page":"1906","article-title":"Secret communication using artificial noise","author":"Negi S. Goel R.","year":"2005","unstructured":"S. Goel R. Negi , \" Secret communication using artificial noise ,\" in IEEE Vehicular Technology Conference , September 2005 , pp. 1906 -- 1910 . S. Goel R. Negi, \"Secret communication using artificial noise,\" in IEEE Vehicular Technology Conference, September 2005, pp. 1906--1910.","journal-title":"IEEE Vehicular Technology Conference"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2003.820010"}],"event":{"name":"DIWANS06: Workshop on Dependability Issues in Wireless Ad Hoc Networks and Sensor Networks 2006","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"Los Angeles California","acronym":"DIWANS06"},"container-title":["Proceedings of the 5th ACM workshop on Wireless security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1161289.1161297","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,8]],"date-time":"2023-01-08T19:15:59Z","timestamp":1673205359000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1161289.1161297"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,9,28]]},"references-count":34,"alternative-id":["10.1145\/1161289.1161297","10.1145\/1161289"],"URL":"https:\/\/doi.org\/10.1145\/1161289.1161297","relation":{},"subject":[],"published":{"date-parts":[[2006,9,28]]},"assertion":[{"value":"2006-09-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}