{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T13:31:24Z","timestamp":1730295084396,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,8]]},"DOI":"10.1109\/securware.2008.52","type":"proceedings-article","created":{"date-parts":[[2008,9,16]],"date-time":"2008-09-16T20:43:14Z","timestamp":1221597794000},"page":"238-242","source":"Crossref","is-referenced-by-count":12,"title":["A Novel Approach against DoS Attacks in WiMAX Authentication Using Visual Cryptography"],"prefix":"10.1109","author":[{"given":"Ayesha","family":"Altaf","sequence":"first","affiliation":[]},{"given":"Rabia","family":"Sirhindi","sequence":"additional","affiliation":[]},{"given":"Attiq","family":"Ahmed","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"LNCS","article-title":"visual authentication and identification","year":"1997","author":"naor","key":"15"},{"journal-title":"LNCS","article-title":"visual cryptography","year":"1994","author":"naor","key":"16"},{"key":"13","article-title":"securities vulnerabilities and solutions in mobile wimax","volume":"7","author":"deininger","year":"2007","journal-title":"International Journal of Computer Science and Network Security"},{"year":"0","key":"14"},{"journal-title":"Broadband Wireless Metropolitan Area networks Security","year":"2007","author":"greiler","key":"11"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/EIT.2006.252118"},{"year":"0","key":"3"},{"year":"0","key":"2"},{"year":"0","key":"1"},{"journal-title":"Institute of Computing Technology Chinese Academy of Sciences Kexueyuan South Road","article-title":"overview and analysis of ieee 802.16e security","year":"0","author":"pang","key":"10"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.20"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1089761.1089764"},{"journal-title":"School of Computer and Information Science","article-title":"security issues of ieee 802.16 (wimax)","year":"2006","author":"hasan","key":"5"},{"journal-title":"Cryptography and Network Security Principles and Practices","year":"2003","author":"stalling","key":"4"},{"journal-title":"Mutual Authorization for PKMv2","year":"2004","author":"johnston","key":"9"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/ISWCS.2006.4362284"}],"event":{"name":"2008 Second International Conference on Emerging Security Information, Systems and Technologies (SECUREWARE)","start":{"date-parts":[[2008,8,25]]},"location":"Cap Esterel, France","end":{"date-parts":[[2008,8,31]]}},"container-title":["2008 Second International Conference on Emerging Security Information, Systems and Technologies"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4622544\/4622545\/04622589.pdf?arnumber=4622589","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,17]],"date-time":"2017-03-17T15:48:34Z","timestamp":1489765714000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4622589\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,8]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/securware.2008.52","relation":{},"subject":[],"published":{"date-parts":[[2008,8]]}}}