{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T21:12:21Z","timestamp":1723065141155},"reference-count":10,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"7","license":[{"start":{"date-parts":[[2005,7,1]],"date-time":"2005-07-01T00:00:00Z","timestamp":1120176000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer"],"published-print":{"date-parts":[[2005,7]]},"DOI":"10.1109\/mc.2005.241","type":"journal-article","created":{"date-parts":[[2005,7,13]],"date-time":"2005-07-13T21:51:54Z","timestamp":1121291514000},"page":"28-34","source":"Crossref","is-referenced-by-count":27,"title":["Securing Wi-Fi networks"],"prefix":"10.1109","volume":"38","author":[{"given":"K.J.","family":"Hole","sequence":"first","affiliation":[]},{"given":"E.","family":"Dyrnes","sequence":"additional","affiliation":[]},{"given":"P.","family":"Thorsheim","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"bibr70284","author":"barken","year":"2004","journal-title":"How Secure Is Your Wireless Network? Safeguarding Your Wi-Fi LAN"},{"key":"bibr70285","author":"schneier","year":"2000","journal-title":"Secrets and Lies Digital Security in a Networked World"},{"key":"bibr702810","author":"potter","year":"2003","journal-title":"802 11 Security"},{"key":"bibr70282","author":"mcclure","year":"2003","journal-title":"Hacking Exposed Network Security Secrets and Solutions"},{"key":"bibr70283","author":"edney","year":"2004","journal-title":"Real 802 11 Security Wi-Fi Protected Access and 802 11i"},{"key":"bibr70281","author":"gast","year":"2002","journal-title":"802 11 Wireless Networks The Definitive Guide"},{"key":"bibr70287","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1145\/997122.997132","article-title":"weaknesses in the temporal key hash of wpa","volume":"8","author":"moen","year":"2004","journal-title":"ACM Sig-Mobile Mobile Computing and Comm Rev"},{"key":"bibr70286","author":"engst","year":"2004","journal-title":"The Wireless Networking Starter Kit The Practical Guide to Wi-Fi Networks for Windows and Macintosh"},{"key":"bibr70289","article-title":"a cryptographic evaluation of ipsec\";","author":"ferguson","year":"0"},{"key":"bibr70288","article-title":"analysis of microsoft pptp version 2\";","author":"schneier","year":"0"}],"container-title":["Computer"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/2\/31455\/01463102.pdf?arnumber=1463102","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,29]],"date-time":"2021-11-29T20:30:37Z","timestamp":1638217837000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1463102\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,7]]},"references-count":10,"journal-issue":{"issue":"7"},"URL":"https:\/\/doi.org\/10.1109\/mc.2005.241","relation":{},"ISSN":["0018-9162"],"issn-type":[{"value":"0018-9162","type":"print"}],"subject":[],"published":{"date-parts":[[2005,7]]}}}