{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,3]],"date-time":"2022-04-03T14:02:41Z","timestamp":1648994561568},"reference-count":27,"publisher":"Elsevier BV","issue":"1","license":[{"start":{"date-parts":[[2007,1,1]],"date-time":"2007-01-01T00:00:00Z","timestamp":1167609600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Pervasive and Mobile Computing"],"published-print":{"date-parts":[[2007,1]]},"DOI":"10.1016\/j.pmcj.2006.06.002","type":"journal-article","created":{"date-parts":[[2006,8,7]],"date-time":"2006-08-07T10:56:15Z","timestamp":1154948175000},"page":"1-14","source":"Crossref","is-referenced-by-count":3,"title":["Flexible and fast security solution for wireless LAN"],"prefix":"10.1016","volume":"3","author":[{"given":"Mohamad","family":"Badra","sequence":"first","affiliation":[]},{"given":"Pascal","family":"Urien","sequence":"additional","affiliation":[]},{"given":"Ibrahim","family":"Hajjeh","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.pmcj.2006.06.002_b1","doi-asserted-by":"crossref","unstructured":"T. Dierks et al., The TLS Protocol Version 1.0, RFC 2246, January 1999","DOI":"10.17487\/rfc2246"},{"key":"10.1016\/j.pmcj.2006.06.002_b2","doi-asserted-by":"crossref","unstructured":"B. Aboba, D. Simon, PPP EAP TLS Authentication Protocol, RFC 2716, October 1999","DOI":"10.17487\/rfc2716"},{"key":"10.1016\/j.pmcj.2006.06.002_b3","doi-asserted-by":"crossref","unstructured":"B. Aboba et al., PPP Extensible Authentication Protocol (EAP), RFC 3748, June 2004","DOI":"10.17487\/rfc3748"},{"key":"10.1016\/j.pmcj.2006.06.002_b4","doi-asserted-by":"crossref","unstructured":"R. Rivest, S. Dusse, The MD5 Message-Digest Algorithm, RFC 1321, April 1992","DOI":"10.17487\/rfc1321"},{"key":"10.1016\/j.pmcj.2006.06.002_b5","unstructured":"IEEE Draft P802.11i\/D6, Specification for Enhanced Security, October 2003"},{"key":"10.1016\/j.pmcj.2006.06.002_b6","unstructured":"IEEE Draft P802 1X\/D11, Standards for Local and Metropolitan Area Networks: Standard for Port Based Network Access Control, Mars 2001"},{"key":"10.1016\/j.pmcj.2006.06.002_b7","series-title":"Building Secure Wireless Networks with 802.11","author":"Khan","year":"2003"},{"key":"10.1016\/j.pmcj.2006.06.002_b8","doi-asserted-by":"crossref","unstructured":"W. Arbaugh, N. Shankar, Y. Wan, Your 802.11 Wireless Network has No Clothe,http:\/\/www.cs.umd.edu\/~waa\/wireless.pdf 2001","DOI":"10.1142\/9789812799562_0013"},{"key":"10.1016\/j.pmcj.2006.06.002_b9","unstructured":"B.R. Miller, B.A. Hamilton, Issues in Wireless Security WEP, WPA and 802.11i, in: Proceedings of the 18th Annual Computer Security Applications Conference, December 2002"},{"key":"10.1016\/j.pmcj.2006.06.002_b10","unstructured":"IEEE P802.1X Approved Draft, Port based Network Access Control, June 2001"},{"key":"10.1016\/j.pmcj.2006.06.002_b11","unstructured":"IEEE Draft 802.11I\/D6.1, Draft Supplement to STANDARD FOR Telecommunications and Information Exchange between Systems LAN MAN Specific Requirements Part 11: Wireless Medium Access Control (MAC) and physical layer (PHY) specifications: Specification for Enhanced Security, August 2003"},{"key":"10.1016\/j.pmcj.2006.06.002_b12","unstructured":"Wi-Fi Protected Access (WPA), version 2.0, April 29 2003"},{"key":"10.1016\/j.pmcj.2006.06.002_b13","unstructured":"National Institute of Standards and Technology, Specification for the Advanced Encryption Standard (AES), FIPS 197, November 2001"},{"key":"10.1016\/j.pmcj.2006.06.002_b14","unstructured":"Microsoft EAP CHAP Extensions, draft-kamath-pppext-eap-mschapv2-00.txt, September 2002"},{"key":"10.1016\/j.pmcj.2006.06.002_b15","unstructured":"P. Funk, S. Blake-Wilson, EAP Tunneled TLS Authentication Protocol (EAP-TTLS), draft-ietf-pppext-eap-ttls-05.txt, Internet-Draft, July 2004 (expired)"},{"key":"10.1016\/j.pmcj.2006.06.002_b16","unstructured":"P. Urien et al., EAP-Support in Smartcard, draft-urien-eap-smartcard-07.txt, IETF Internet Draft, August 2005"},{"key":"10.1016\/j.pmcj.2006.06.002_b17","unstructured":"A. Palekar, et al. protected EAP protocol (PEAP), draft-josefsson-pppext-eap-tls-eap-10.txt, Internet-Draft, October 2004 (expired)"},{"key":"10.1016\/j.pmcj.2006.06.002_b18","unstructured":"N. Cam-Winget, et al. EAP Flexible Authentication via Secure Tunneling (EAP-FAST), draft-cam-winget-eap-fast-03.txt, October 2005 (in preparation)"},{"key":"10.1016\/j.pmcj.2006.06.002_b19","unstructured":"J. Puthenkulam, V. Lortz, A. Palekar, The Compound Authentication Binding Problem, draft-puthenkulam-eap-binding-04.txt, October 2003"},{"key":"10.1016\/j.pmcj.2006.06.002_b20","unstructured":"N. Asokan, N. Valtteri, K. Nyberg, Man-in-the-Middle in Tunnelled Authentication Protocols, June 2003"},{"key":"10.1016\/j.pmcj.2006.06.002_b21","series-title":"Java Card Technology for Smart Cards","author":"Chen","year":"2000"},{"key":"10.1016\/j.pmcj.2006.06.002_b22","unstructured":"M. Badra, P. Urien, Toward SSL integration in SIM SmartCards, in: IEEE Wireless Communications and Networking Conference, IEEE WCNC, Atlanta, GA, USA, ISBN 0-7803-8345-1 2004. (CD-ROM)"},{"key":"10.1016\/j.pmcj.2006.06.002_b23","series-title":"EAP-TLS Smartcards, from Dream to Reality, in: the Fourth IEEE workshop on Applications and Services in Wireless Networks","author":"Urien","year":"2004"},{"key":"10.1016\/j.pmcj.2006.06.002_b24","unstructured":"Information Security: Advances and Remaining Challenges to Adoption of Public Key Infrastructure Technology, Report to the Chairman, Subcommittee on Government Efficiency, Financial Management and Intergovernmental Relations, Committee on Government Reform, House of Representatives, February 2001"},{"key":"10.1016\/j.pmcj.2006.06.002_b25","unstructured":"OpenSSL open source, Available at http:\/\/www.openssl.org"},{"key":"10.1016\/j.pmcj.2006.06.002_b26","unstructured":"P. Urien, M. Dandjinou, The OpenEapSmartcard project, ANCS 2005, Columbia University, New York, USA, June 2005"},{"key":"10.1016\/j.pmcj.2006.06.002_b27","unstructured":"FreeRADIUS open source, Available at http:\/\/www.freeradius.org"}],"container-title":["Pervasive and Mobile Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1574119206000253?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1574119206000253?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,4,20]],"date-time":"2019-04-20T10:54:32Z","timestamp":1555757672000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1574119206000253"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,1]]},"references-count":27,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2007,1]]}},"alternative-id":["S1574119206000253"],"URL":"https:\/\/doi.org\/10.1016\/j.pmcj.2006.06.002","relation":{},"ISSN":["1574-1192"],"issn-type":[{"value":"1574-1192","type":"print"}],"subject":[],"published":{"date-parts":[[2007,1]]}}}