{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:32:59Z","timestamp":1750307579416,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":11,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,11,24]],"date-time":"2009-11-24T00:00:00Z","timestamp":1259020800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,11,24]]},"DOI":"10.1145\/1655925.1656084","type":"proceedings-article","created":{"date-parts":[[2009,11,24]],"date-time":"2009-11-24T15:21:10Z","timestamp":1259076070000},"page":"873-876","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["The performance of IPv4 and IPv6 using UDP on IEEE 802.11n WLANs with WPA2 security"],"prefix":"10.1145","author":[{"given":"Samad S.","family":"Kolahi","sequence":"first","affiliation":[{"name":"UNITEC, New Zealand"}]},{"given":"Zhang","family":"Qu","sequence":"additional","affiliation":[{"name":"UNITEC, New Zealand"}]},{"given":"Burjiz K.","family":"Soorty","sequence":"additional","affiliation":[{"name":"UNITEC, New Zealand"}]},{"given":"Navneet","family":"Chand","sequence":"additional","affiliation":[{"name":"UNITEC, New Zealand"}]}],"member":"320","published-online":{"date-parts":[[2009,11,24]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"S. McCann \"Official IEEE 802.11 Working Group Project Timelines - 07\/22\/09 \" 2009; http:\/\/www.ieee802.org\/11\/Reports\/802.11_Timelines.htm.  S. McCann \"Official IEEE 802.11 Working Group Project Timelines - 07\/22\/09 \" 2009; http:\/\/www.ieee802.org\/11\/Reports\/802.11_Timelines.htm."},{"volume-title":"Vista Gets Skipped,\" 2009","author":"Oiaga M.","key":"e_1_3_2_1_2_1","unstructured":"M. Oiaga , \"Corp orate IT Spending Feb 2009. Windows 7 Gets All the Love , Vista Gets Skipped,\" 2009 ; http:\/\/news.softpedia.com\/newsImage\/Windows-7-Gets-All-the- Love-Vista-Gets-Skipped- 4.jpg. M. Oiaga, \"Corporate IT Spending Feb 2009. Windows 7 Gets All the Love, Vista Gets Skipped,\" 2009; http:\/\/news.softpedia.com\/newsImage\/Windows-7-Gets-All-the- Love-Vista-Gets-Skipped-4.jpg."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1049\/ip-com:20040283"},{"key":"e_1_3_2_1_4_1","first-page":"260","volume-title":"IEEE Symposium on Computers and Communications","author":"Kolahi S. S.","year":"2008","unstructured":"S. S. Kolahi , S. Narayan , D. D. T., Y. Sunarto , P. Mani , \" The Impact of Wireless LAN Security on Performance of Different Windows Operating Systems ,\" IEEE Symposium on Computers and Communications , 2008 , pp. 260 -- 264 . S. S. Kolahi, S. Narayan, D. D. T., Y. Sunarto, P. Mani, \"The Impact of Wireless LAN Security on Performance of Different Windows Operating Systems,\" IEEE Symposium on Computers and Communications, 2008, pp. 260--264."},{"key":"e_1_3_2_1_5_1","first-page":"1","volume-title":"WOCN'07","author":"Filho E. J. M. A.","unstructured":"E. J. M. A. Filho , P. N. L. Fonseca , M. J. S. Leitao , and P. S. F. de Barros , \" Security versus Bandwidth : The Support of Mechanisms WEP e WPA in 802.11g Network,\" IFIP International Conference on Wireless and Optical Communications Networks, 2007 . WOCN'07 , pp. 1 -- 5 . E. J. M. A. Filho, P. N. L. Fonseca, M. J. S. Leitao, and P. S. F. de Barros, \"Security versus Bandwidth: The Support of Mechanisms WEP e WPA in 802.11g Network,\" IFIP International Conference on Wireless and Optical Communications Networks, 2007. WOCN'07, pp. 1--5."},{"key":"e_1_3_2_1_6_1","first-page":"1","article-title":"Impact of Security on the Performance of Wireless-Local Area Networks","author":"Ezedin B.","year":"2006","unstructured":"B. Ezedin , B. Mohammed , A. Amal , S. Hanadi Al , K. Huda , and M. Meera Al , \" Impact of Security on the Performance of Wireless-Local Area Networks ,\" Innovations in Information Technology , 2006 , pp. 1 -- 5 . B. Ezedin, B. Mohammed, A. Amal, S. Hanadi Al, K. Huda, and M. Meera Al, \"Impact of Security on the Performance of Wireless-Local Area Networks,\" Innovations in Information Technology, 2006, pp. 1--5.","journal-title":"Innovations in Information Technology"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICON.2004.1409151"},{"key":"e_1_3_2_1_8_1","unstructured":"P. Killelea \"Web Performance Tuning \" http:\/\/www.amazon.ca\/Web-Performance-Tuning-Patrick-Killelea\/dp\/product- description\/059600172X.   P. Killelea \"Web Performance Tuning \" http:\/\/www.amazon.ca\/Web-Performance-Tuning-Patrick-Killelea\/dp\/product- description\/059600172X."},{"key":"e_1_3_2_1_9_1","first-page":"353","volume-title":"802.11 PHY layers,\" CWAP - certified wireless analysis professional official study guide","author":"Akin D.","year":"2004","unstructured":"D. Akin , and J. Geier , \" 802.11 PHY layers,\" CWAP - certified wireless analysis professional official study guide , McGraw-Hill , 2004 , pp. 353 -- 355 . D. Akin, and J. Geier, \"802.11 PHY layers,\" CWAP - certified wireless analysis professional official study guide, McGraw-Hill, 2004, pp. 353--355."},{"key":"e_1_3_2_1_10_1","unstructured":"ZTI Telecom \"IP Traffic - test&amp;measure \" http:\/\/www.ztitelecom.com.  ZTI Telecom \"IP Traffic - test&amp;measure \" http:\/\/www.ztitelecom.com."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2003.1200301"}],"event":{"name":"ICIS '09: The 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human","sponsor":["AICIT","ETRI","KISTI"],"location":"Seoul Korea","acronym":"ICIS '09"},"container-title":["Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1655925.1656084","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1655925.1656084","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:41:12Z","timestamp":1750250472000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1655925.1656084"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,11,24]]},"references-count":11,"alternative-id":["10.1145\/1655925.1656084","10.1145\/1655925"],"URL":"https:\/\/doi.org\/10.1145\/1655925.1656084","relation":{},"subject":[],"published":{"date-parts":[[2009,11,24]]},"assertion":[{"value":"2009-11-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}