{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:53:04Z","timestamp":1750308784909,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,12,14]],"date-time":"2009-12-14T00:00:00Z","timestamp":1260748800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,12,14]]},"DOI":"10.1145\/1821748.1821839","type":"proceedings-article","created":{"date-parts":[[2010,6,25]],"date-time":"2010-06-25T17:43:45Z","timestamp":1277487825000},"page":"475-480","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["ANonce encryption in 802.11i 4-way handshake protocol"],"prefix":"10.1145","author":[{"given":"Aidil Izani","family":"Jafri","sequence":"first","affiliation":[{"name":"Multimedia University, Jalan Ayer Keroh Lama, Melaka, Malaysia"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yean Li","family":"Ho","sequence":"additional","affiliation":[{"name":"Multimedia University, Jalan Ayer Keroh Lama, Melaka, Malaysia"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2009,12,14]]},"reference":[{"volume-title":"Proceedings of USENIX Security Symposium.","author":"Bellardo J.","key":"e_1_3_2_1_1_1"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.23"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1155\/WCN\/2006\/47453"},{"key":"e_1_3_2_1_4_1","first-page":"11i","article-title":"Real 802.11 Security","volume":"802","author":"Edney J.","year":"2003","journal-title":"Wi-Fi Protected Access and"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/646557.694759"},{"key":"e_1_3_2_1_6_1","unstructured":"Guillaume L. June 2005. Wi-Fi security -- WEP WPA and WPA2. In Hackin9. Available at http:\/\/www.hakin9.org.  Guillaume L. June 2005. Wi-Fi security -- WEP WPA and WPA2. In Hackin9. Available at http:\/\/www.hakin9.org."},{"key":"e_1_3_2_1_7_1","unstructured":"He C. and Mitchell J. C. 2005. Security Analysis and Improvements for IEEE 802.11i. In NDSS.  He C. and Mitchell J. C. 2005. Security Analysis and Improvements for IEEE 802.11i. In NDSS."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1023646.1023655"},{"volume-title":"WITSP'04","year":"2004","author":"Huang J.","key":"e_1_3_2_1_9_1"},{"key":"e_1_3_2_1_10_1","unstructured":"Kuchling A. M. September 2008. Python Cryptography Toolkit. Available at http:\/\/www.amk.ca\/python\/code\/crypto.html  Kuchling A. M. September 2008. Python Cryptography Toolkit. Available at http:\/\/www.amk.ca\/python\/code\/crypto.html"},{"volume-title":"ICC","year":"2008","author":"Liu J.","key":"e_1_3_2_1_11_1"},{"key":"e_1_3_2_1_12_1","unstructured":"IEEE Standard 802.11i-2004. 2004. Information technology -- Telecommunications and information exchange between systems -- Local and metropolitan area networks -- Specific requirements -- Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications.  IEEE Standard 802.11i-2004. 2004. Information technology -- Telecommunications and information exchange between systems -- Local and metropolitan area networks -- Specific requirements -- Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications."},{"key":"e_1_3_2_1_13_1","unstructured":"IEEE Standard 802.11-1999. 1999. Information technology -- Telecommunications and information exchange between systems -- Local and metropolitan area networks -- Specific requirements -- Part 11: Wireless LAN Medium Access Control and Physical Layer specifications.  IEEE Standard 802.11-1999. 1999. Information technology -- Telecommunications and information exchange between systems -- Local and metropolitan area networks -- Specific requirements -- Part 11: Wireless LAN Medium Access Control and Physical Layer specifications."},{"key":"e_1_3_2_1_14_1","unstructured":"National Institute of Standards and Technology. November 2001. Announcing the Advanced Encryption Standard (AES). In Federal Information Processing Standards Publication 197.  National Institute of Standards and Technology. November 2001. Announcing the Advanced Encryption Standard (AES). In Federal Information Processing Standards Publication 197."},{"key":"e_1_3_2_1_15_1","unstructured":"Python: http:\/\/www.python.org  Python: http:\/\/www.python.org"},{"key":"e_1_3_2_1_16_1","unstructured":"Rivest R. L. The MD6 hash function - A proposal to NIST for SHA-3.  Rivest R. L. The MD6 hash function - A proposal to NIST for SHA-3."},{"key":"e_1_3_2_1_17_1","unstructured":"Rivest R. L. The MD6 Hash Algorithm. Available at http:\/\/groups.csail.mit.edu\/cis\/md6\/  Rivest R. L. The MD6 Hash Algorithm. Available at http:\/\/groups.csail.mit.edu\/cis\/md6\/"},{"key":"e_1_3_2_1_18_1","unstructured":"Rivest R. L. Agre B. Bailey D. V. Crutchfield C. Dodis Y. Fleming K. E. Khan A. Krishnamuthy J. Lin Y. Reyzin L. Shen E. Sukha J. Sutherland D. Tromer E. and Yin Y. L. October 2008. The MD6 Hash Function-A proposal to NIST for SHA-3. Rivest's CRYPTO'08. Available at http:\/\/groups.csail.mit.edu\/cis\/md6\/submitted-2008-10-27\/Supporting_Documentation\/md6_report.pdf  Rivest R. L. Agre B. Bailey D. V. Crutchfield C. Dodis Y. Fleming K. E. Khan A. Krishnamuthy J. Lin Y. Reyzin L. Shen E. Sukha J. Sutherland D. Tromer E. and Yin Y. L. October 2008. The MD6 Hash Function-A proposal to NIST for SHA-3. Rivest's CRYPTO'08. Available at http:\/\/groups.csail.mit.edu\/cis\/md6\/submitted-2008-10-27\/Supporting_Documentation\/md6_report.pdf"},{"key":"e_1_3_2_1_19_1","unstructured":"Robshaw M. J. B. November 1996.On Recent Results for MD2 MD4 and MD5\" In RSA Laboratories' Bulletin.  Robshaw M. J. B. November 1996.On Recent Results for MD2 MD4 and MD5\" In RSA Laboratories' Bulletin."},{"key":"e_1_3_2_1_20_1","unstructured":"RSA Laboratories. 2009. What is Cipher Feedback Mode? Available at http:\/\/www.rsa.com\/rsalabs\/node.asp?id=2172  RSA Laboratories. 2009. What is Cipher Feedback Mode? Available at http:\/\/www.rsa.com\/rsalabs\/node.asp?id=2172"},{"volume-title":"SOC Conference, 2003. Proceedings IEEE International {Systems-on-Chip}.","author":"Shim J. H.","key":"e_1_3_2_1_21_1"}],"event":{"name":"MoMM '09: 7th International Conference on Mobile Computing and Multimedia","sponsor":["Johannes Kepler University","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","SIGMM ACM Special Interest Group on Multimedia"],"location":"Kuala Lumpur Malaysia","acronym":"MoMM '09"},"container-title":["Proceedings of the 7th International Conference on Advances in Mobile Computing and Multimedia"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1821748.1821839","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1821748.1821839","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:22:45Z","timestamp":1750278165000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1821748.1821839"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,12,14]]},"references-count":21,"alternative-id":["10.1145\/1821748.1821839","10.1145\/1821748"],"URL":"https:\/\/doi.org\/10.1145\/1821748.1821839","relation":{},"subject":[],"published":{"date-parts":[[2009,12,14]]},"assertion":[{"value":"2009-12-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}