{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T11:13:24Z","timestamp":1723029204205},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2019,9,13]],"date-time":"2019-09-13T00:00:00Z","timestamp":1568332800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,9,13]],"date-time":"2019-09-13T00:00:00Z","timestamp":1568332800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2020,1]]},"DOI":"10.1007\/s11277-019-06760-w","type":"journal-article","created":{"date-parts":[[2019,9,13]],"date-time":"2019-09-13T20:04:46Z","timestamp":1568405086000},"page":"861-872","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":19,"title":["A Secure Stop and Wait Communication Protocol for Disturbed Networks"],"prefix":"10.1007","volume":"110","author":[{"given":"Varun","family":"Shukla","sequence":"first","affiliation":[]},{"given":"Atul","family":"Chaturvedi","sequence":"additional","affiliation":[]},{"given":"Neelam","family":"Srivastava","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,9,13]]},"reference":[{"key":"6760_CR1","volume-title":"Handbook of applied cryptography","author":"A Menezes","year":"2001","unstructured":"Menezes, A., Oorschot, P., & Vanstone, S. (2001). Handbook of applied cryptography (5th ed.). Boca Raton: CRC Press Inc.","edition":"5"},{"key":"6760_CR2","volume-title":"Cryptography and network security, principles and practices","author":"W Stallings","year":"2005","unstructured":"Stallings, W. (2005). Cryptography and network security, principles and practices (4th ed.). Upper Saddle River: Prentice Hall.","edition":"4"},{"issue":"4","key":"6760_CR3","doi-asserted-by":"publisher","first-page":"584","DOI":"10.1007\/s10559-013-9544-x","volume":"49","author":"V Zadiraka","year":"2013","unstructured":"Zadiraka, V., & Kudin, A. (2013). Cloud computing in cryptography and steganography. Cybernetics and Systems Analysis,49(4), 584\u2013588.","journal-title":"Cybernetics and Systems Analysis"},{"key":"6760_CR4","unstructured":"Szczypiorski, K. (2003). Steganography in TCP\/IP networks, state of the art and proposal of a new system-HICCUPS. Retrieved from January 2018 \nhttp:\/\/krzysiek.tele.pw.edu.pl\/pdf\/steg-seminar-2003.pdf\n\n."},{"key":"6760_CR5","unstructured":"Szczypiorski, K. (2003). HICCUPS: Hidden communication system for corrupted networks. In Proceedings of the tenth international multi-conference on advanced computer systems (ACS-2003), Poland (pp. 31\u201340)."},{"key":"6760_CR6","unstructured":"Najjar, A. (2008). The decoy: Multi-level digital multimedia steganography model. In 12th WSEAS international conference on communications, Heraklion, Greece (pp. 445\u2013450)."},{"key":"6760_CR7","doi-asserted-by":"crossref","unstructured":"Mazurczyk, W., & Szczypiorski, K. (2008). Steganography on VoIP streams. In OTM confederated international conferences on the move to meaningful internet systems (part of the lecture notes in computer science book series (LNCS, volume 5332)) (pp. 1001\u20131018).","DOI":"10.1007\/978-3-540-88873-4_6"},{"issue":"2\u20133","key":"6760_CR8","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/s11235-009-9245-y","volume":"45","author":"W Mazurczyk","year":"2010","unstructured":"Mazurczyk, W., & Lubacz, J. (2010). LACK\u2014A VoIP steganographic method. Telecommunication Systems,45(2\u20133), 153\u2013163.","journal-title":"Telecommunication Systems"},{"issue":"3","key":"6760_CR9","doi-asserted-by":"publisher","first-page":"505","DOI":"10.1007\/s00500-009-0530-1","volume":"15","author":"W Mazurczyk","year":"2011","unstructured":"Mazurczyk, W., Smolarczyk, M., & Szczypiorski, K. (2011). Retransmission steganography and its detection. Soft Computing,15(3), 505\u2013515.","journal-title":"Soft Computing"},{"key":"6760_CR10","doi-asserted-by":"crossref","unstructured":"Fraczek, W., Mazurczyk, W., & Szczypiorski, K. (2010). Stream control transmission protocol steganography. In Second international workshop on network steganography (IWNS 2010) co-located with the 2010 international conference on multimedia information networking and security (MINES 2010), Nanjing, China (pp. 829\u2013834).","DOI":"10.1109\/MINES.2010.176"},{"key":"6760_CR11","unstructured":"Mazurczyk, W., Szaga, P., & Szczypiorski, K. (2011). Using transcoding for hidden communication in IP telephony. In Computing research repository (CORR), abs\/1111.1250, arXiv.org E-print Achieve. Ithaca: Cornell University (pp. 1\u201317)."},{"issue":"5","key":"6760_CR12","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1109\/MCOM.2014.6815916","volume":"52","author":"J Lubacz","year":"2014","unstructured":"Lubacz, J., Mazurczyk, W., & Szczypiorski, K. (2014). Principles and overview of network steganography. IEEE Communications Magazine,52(5), 225\u2013229.","journal-title":"IEEE Communications Magazine"},{"key":"6760_CR13","unstructured":"Sekhar, A., Kumar, M., & Rahiman, M. (2015). A novel approach for hiding data in videos using network steganography methods. In 4th international conference on eco friendly computing and communication systems. Procedia Computer Science. Amsterdam: Elsevier (vol. 70, pp. 764\u2013768)."},{"issue":"1\u20132","key":"6760_CR14","first-page":"1","volume":"58","author":"B Jankowski","year":"2015","unstructured":"Jankowski, B., Mazurczyk, W., & Szczypiorski, K. (2015). Padsteg: Introducing inter-protocol steganography. Telecommunication Systems,58(1\u20132), 1\u20139.","journal-title":"Telecommunication Systems"},{"key":"6760_CR15","first-page":"1","volume":"9","author":"A Attaby","year":"2017","unstructured":"Attaby, A., Ahmed, M., & Alsammak, A. (2017). Data hiding inside JPEG images with high resistance to steganalysis using a novel technique: DCT-M3. Ain Shams Engineering Journal,9, 1\u201310.","journal-title":"Ain Shams Engineering Journal"},{"issue":"2","key":"6760_CR16","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1007\/s40708-016-0057-z","volume":"4","author":"M Jain","year":"2017","unstructured":"Jain, M., Kumar, A., & Choudhary, R. (2017). Improved diagonal medical image steganography using chaos theory, LFSR, and rabin cryptosystem. Brain Informatics,4(2), 95\u2013106.","journal-title":"Brain Informatics"},{"issue":"10","key":"6760_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TIFS.2017.2705625","volume":"12","author":"T Denemark","year":"2017","unstructured":"Denemark, T., & Fridrich, J. (2017). Steganography with multiple JPEG images of the same scene. IEEE Transactions on Information Forensics and Security,12(10), 1\u201313.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"3","key":"6760_CR18","doi-asserted-by":"publisher","first-page":"817","DOI":"10.1109\/TNET.2009.2020820","volume":"17","author":"J Li","year":"2009","unstructured":"Li, J., & Zhao, Y. (2009). Resequencing analysis of stop-and-wait ARQ for parallel multichannel communications. IEEE\/ACM Transactions on Networking,17(3), 817\u2013830.","journal-title":"IEEE\/ACM Transactions on Networking"},{"issue":"7","key":"6760_CR19","first-page":"673","volume":"11","author":"N Saper","year":"2013","unstructured":"Saper, N. (2013). International cryptography regulation and the global information economy. Northwestern Journal of Technology and Intellectual Property,11(7), 673\u2013688.","journal-title":"Northwestern Journal of Technology and Intellectual Property"},{"issue":"6","key":"6760_CR20","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W Diffie","year":"1976","unstructured":"Diffie, W., & Hellman, M. (1976). New directions in cryptography. IEEE Transactions on Information Theory,22(6), 644\u2013654.","journal-title":"IEEE Transactions on Information Theory"},{"issue":"3","key":"6760_CR21","doi-asserted-by":"publisher","first-page":"556","DOI":"10.1109\/TMC.2012.34","volume":"12","author":"J Lin","year":"2013","unstructured":"Lin, J., Feng, K., Huang, Y., & Wang, L. (2013). Novel design and analysis of aggregated ARQ protocols for IEEE 802.11n networks. IEEE Transactions on Mobile Computing,12(3), 556\u2013570.","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"6760_CR22","unstructured":"Schneier, B. (1993). Schneier on security, The Blowfish encryption algorithm. Retrieved on January 2018, from \nhttps:\/\/www.schneier.com\/academic\/blowfish\/\n\n."},{"key":"6760_CR23","volume-title":"Applied cryptography: Protocols, algorithms, and source code in C","author":"B Schneier","year":"2007","unstructured":"Schneier, B. (2007). Applied cryptography: Protocols, algorithms, and source code in C (2nd ed.). New York: Wiley.","edition":"2"},{"issue":"1","key":"6760_CR24","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1109\/SURV.2013.111413.00196","volume":"16","author":"S Mirzadeh","year":"2014","unstructured":"Mirzadeh, S., Cruickshank, H., & Tafazolli, R. (2014). Secure device pairing: A survey. IEEE Communications Surveys and Tutorials,16(1), 17\u201340.","journal-title":"IEEE Communications Surveys and Tutorials"},{"issue":"1\u20133","key":"6760_CR25","doi-asserted-by":"publisher","first-page":"280","DOI":"10.1016\/j.tcs.2005.11.038","volume":"352","author":"Z Zhao","year":"2006","unstructured":"Zhao, Z., Dong, Z., & Wang, Y. (2006). Security analysis of a password-based authentication protocol proposed to IEEE 1363. Theoretical Computer Science,352(1\u20133), 280\u2013287.","journal-title":"Theoretical Computer Science"},{"issue":"2","key":"6760_CR26","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1109\/MSECP.2003.1193210","volume":"99","author":"W Burr","year":"2003","unstructured":"Burr, W. (2003). Selecting the advanced encryption standard. IEEE Security and Privacy,99(2), 43\u201352.","journal-title":"IEEE Security and Privacy"},{"issue":"4","key":"6760_CR27","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/MCAS.2002.1173133","volume":"2","author":"X Zhang","year":"2002","unstructured":"Zhang, X., & Parhi, K. (2002). Implementation approaches for the advanced encryption standard algorithm. IEEE Circuits and Systems Magazine,2(4), 24\u201346.","journal-title":"IEEE Circuits and Systems Magazine"},{"issue":"1","key":"6760_CR28","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1109\/45.913206","volume":"20","author":"A Subramanya","year":"2001","unstructured":"Subramanya, A. (2001). Image compression technique. IEEE Potentials,20(1), 19\u201323.","journal-title":"IEEE Potentials"},{"issue":"4","key":"6760_CR29","doi-asserted-by":"publisher","first-page":"500","DOI":"10.1109\/83.913585","volume":"10","author":"M Martin","year":"2001","unstructured":"Martin, M., & Bell, A. (2001). New image compression techniques using multiwavelets and multiwavelet packets. IEEE Transactions on Image Processing,10(4), 500\u2013510.","journal-title":"IEEE Transactions on Image Processing"},{"key":"6760_CR30","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1016\/j.camwa.2007.11.043","volume":"56","author":"H Bahadili","year":"2008","unstructured":"Bahadili, H. (2008). A novel loseless data compression scheme based on the error correcting hamming codes. Computers and Mathematics with Application,56, 143\u2013150.","journal-title":"Computers and Mathematics with Application"},{"issue":"7","key":"6760_CR31","first-page":"1","volume":"5","author":"M Siddeq","year":"2014","unstructured":"Siddeq, M., & Rodrigues, M. (2014). A novel image compression algorithm for high resolution 3D reconstruction. 3D Research,5(7), 1\u201317.","journal-title":"3D Research"},{"issue":"1","key":"6760_CR32","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1109\/MSP.2009.12","volume":"7","author":"F Callegati","year":"2009","unstructured":"Callegati, F., Cerroni, W., & Ramilli, M. (2009). Man-in-the-middle attack to the HTTPS protocol. IEEE Security and Privacy,7(1), 78\u201381.","journal-title":"IEEE Security and Privacy"},{"issue":"3","key":"6760_CR33","doi-asserted-by":"publisher","first-page":"2027","DOI":"10.1109\/COMST.2016.2548426","volume":"18","author":"M Conti","year":"2016","unstructured":"Conti, M., Dragoni, N., & Lesyk, V. (2016). A survey of man in the middle attacks. IEEE Communications Surveys and Tutorials,18(3), 2027\u20132051.","journal-title":"IEEE Communications Surveys and Tutorials"},{"issue":"4","key":"6760_CR34","doi-asserted-by":"publisher","first-page":"408","DOI":"10.1002\/wcm.2527","volume":"16","author":"L Wang","year":"2016","unstructured":"Wang, L. (2016). Detection of man-in-the-middle attacks using physical layer wireless security techniques. Wireless Communications & Mobile Computing,16(4), 408\u2013426.","journal-title":"Wireless Communications & Mobile Computing"},{"issue":"5","key":"6760_CR35","doi-asserted-by":"publisher","first-page":"1365","DOI":"10.1109\/TVT.2003.815980","volume":"52","author":"M Rossi","year":"2003","unstructured":"Rossi, M., & Zorzi, M. (2003). Analysis and heuristics for the characterization of selective repeat ARQ delay statistics over wireless channels. IEEE Transactions on Vehicular Technology,52(5), 1365\u20131377.","journal-title":"IEEE Transactions on Vehicular Technology"},{"issue":"3\u20134","key":"6760_CR36","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1007\/s11235-007-9032-6","volume":"34","author":"T Ikegawa","year":"2007","unstructured":"Ikegawa, T., & Takahashi, Y. (2007). Sliding window protocol with selective-repeat ARQ: Performance modeling and analysis. Telecommunication Systems,34(3\u20134), 167\u2013180.","journal-title":"Telecommunication Systems"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-019-06760-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-019-06760-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-019-06760-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,11]],"date-time":"2020-09-11T23:29:11Z","timestamp":1599866951000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-019-06760-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9,13]]},"references-count":36,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2020,1]]}},"alternative-id":["6760"],"URL":"https:\/\/doi.org\/10.1007\/s11277-019-06760-w","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,9,13]]},"assertion":[{"value":"13 September 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}