{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T18:55:29Z","timestamp":1730314529171,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,10,27]]},"DOI":"10.1145\/1454586.1454592","type":"proceedings-article","created":{"date-parts":[[2008,10,28]],"date-time":"2008-10-28T12:18:35Z","timestamp":1225196315000},"page":"27-34","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Fast, secure handovers in 802.11"],"prefix":"10.1145","author":[{"given":"Rodolphe","family":"Marques","sequence":"first","affiliation":[{"name":"IEETA\/University of Aveiro, Aveiro, Portugal"}]},{"given":"Andr\u00e9","family":"Z\u00faquete","sequence":"additional","affiliation":[{"name":"IT\/IEETA\/University of Aveiro, Aveiro, Portugal"}]}],"member":"320","published-online":{"date-parts":[[2008,10,27]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"B. Aboba. IEEE 802.1X Pre-Authentication. IEEE 802.11 TGi draft 802.11-02\/389r0 June 2002. B. Aboba. IEEE 802.1X Pre-Authentication. IEEE 802.11 TGi draft 802.11-02\/389r0 June 2002."},{"key":"e_1_3_2_1_2_1","first-page":"e802","author":"Aboba B.","year":"2004","unstructured":"B. Aboba . IEEE 802.11i: A Retrospective , 2004 . www.iee e802 .org\/1\/files\/public\/docs2004\/11i-Retrospective.ppt. B. Aboba. IEEE 802.11i: A Retrospective, 2004. www.ieee802.org\/1\/files\/public\/docs2004\/11i-Retrospective.ppt.","journal-title":"IEEE 802.11i: A Retrospective"},{"key":"e_1_3_2_1_3_1","volume-title":"Nov.","author":"Aboba B.","year":"2007","unstructured":"B. Aboba , D. Simon , and P. Eronen . Extensible Authentication Protocol (EAP) Key Management Framework , Nov. 2007 . draft-ietf-eap-keying-22. B. Aboba, D. Simon, and P. Eronen. Extensible Authentication Protocol (EAP) Key Management Framework, Nov. 2007. draft-ietf-eap-keying-22."},{"key":"e_1_3_2_1_4_1","volume-title":"Analysis of Roaming Techniques","author":"Alimian A.","year":"2004","unstructured":"A. Alimian and B. Aboba . Analysis of Roaming Techniques . IEEE 802.11 WG document 802.11-04\/0377r1, 2004 . A. Alimian and B. Aboba. Analysis of Roaming Techniques. IEEE 802.11 WG document 802.11-04\/0377r1, 2004."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECURECOMM.2005.58"},{"key":"e_1_3_2_1_6_1","volume-title":"A Seamless Hando Mechanism for DHCP-Based IEEE 802.11 WLANs","author":"Chen J.","year":"2007","unstructured":"J. Chen , Y. Tseng , and H. Lee . A Seamless Hando Mechanism for DHCP-Based IEEE 802.11 WLANs . IEEE Comm. Letters , 11(8):665--667, Aug. 2007 . J. Chen, Y. Tseng, and H. Lee. A Seamless Hando Mechanism for DHCP-Based IEEE 802.11 WLANs. IEEE Comm. Letters, 11(8):665--667, Aug. 2007."},{"key":"e_1_3_2_1_7_1","volume-title":"IETF","author":"Clancy T.","year":"2008","unstructured":"T. Clancy , M. Nakhjiri , V. Narayanan , and L. Dondeti . Handover Key Management and Re-Authentication Problem Statement. RFC 5169 , IETF , Mar. 2008 . T. Clancy, M. Nakhjiri, V. Narayanan, and L. Dondeti. Handover Key Management and Re-Authentication Problem Statement. RFC 5169, IETF, Mar. 2008."},{"key":"e_1_3_2_1_8_1","volume-title":"IETF","author":"Govindan S.","year":"2006","unstructured":"S. Govindan , H. Cheng , Z. H. Yao , W. H. Zhou , and L. Yang . Objectives for Control and Provisioning of Wireless Access Points (CAPWAP). RFC 4564 , IETF , July 2006 . S. Govindan, H. Cheng, Z. H. Yao, W. H. Zhou, and L. Yang. Objectives for Control and Provisioning of Wireless Access Points (CAPWAP). RFC 4564, IETF, July 2006."},{"key":"e_1_3_2_1_9_1","volume-title":"Secure Roaming in 802.11 Networks","author":"Greenlaw R.","year":"2007","unstructured":"R. Greenlaw and P. Goransson . Secure Roaming in 802.11 Networks . Elsevier , 2007 . ISBN-13 978-0-7506-8211-4. R. Greenlaw and P. Goransson. Secure Roaming in 802.11 Networks. Elsevier, 2007. ISBN-13 978-0-7506-8211-4."},{"key":"e_1_3_2_1_10_1","volume-title":"Int. Comp. Symp. (ICS 2006","author":"Huang C.-M.","year":"2006","unstructured":"C.-M. Huang and J.-W. Li . An IEEE 802.11 Fast Reassociation and Pairwise Transient Key establishment Based on the Dynamic Cluster Method. In Works. of Comp. Networks and Wireless Communications , Int. Comp. Symp. (ICS 2006 ), Taipei, Taiwan , 2006 . C.-M. Huang and J.-W. Li. An IEEE 802.11 Fast Reassociation and Pairwise Transient Key establishment Based on the Dynamic Cluster Method. In Works. of Comp. Networks and Wireless Communications, Int. Comp. Symp. (ICS 2006), Taipei, Taiwan, 2006."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1089737.1089746"},{"key":"e_1_3_2_1_12_1","volume-title":"IETF","author":"Kaufman C.","year":"2005","unstructured":"C. Kaufman . Internet Key Exchange (IKEv2) Protocol. RFC 4306 , IETF , Dec. 2005 . C. Kaufman. Internet Key Exchange (IKEv2) Protocol. RFC 4306, IETF, Dec. 2005."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/1784707.1784765"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/956981.956990"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2004.1269714"},{"key":"e_1_3_2_1_16_1","volume-title":"IETF HOKEY WG Internet-Draft","author":"Nakhjiri M.","year":"2007","unstructured":"M. Nakhjiri and Y. Ohba . Derivation, delivery and management of EAP based keys for handover and re-authentication . IETF HOKEY WG Internet-Draft , Nov. 2007 . draft-ietf-hokey-key-mgm-01. M. Nakhjiri and Y. Ohba. Derivation, delivery and management of EAP based keys for handover and re-authentication. IETF HOKEY WG Internet-Draft, Nov. 2007. draft-ietf-hokey-key-mgm-01."},{"key":"e_1_3_2_1_17_1","volume-title":"IETF HOKEY WG Internet-Draft","author":"Narayanan V.","year":"2007","unstructured":"V. Narayanan and L. Dondeti . EAP Extensions for EAP Re-authentication Protocol (ERP) . IETF HOKEY WG Internet-Draft , Nov. 2007 . draft-ietf-hokey-erx-08. V. Narayanan and L. Dondeti. EAP Extensions for EAP Re-authentication Protocol (ERP). IETF HOKEY WG Internet-Draft, Nov. 2007. draft-ietf-hokey-erx-08."},{"key":"e_1_3_2_1_18_1","volume-title":"Amendment 6: Medium Access Control (MAC) Security Enhancements","author":"L. S.","year":"2004","unstructured":"L. S. C. of the IEEE Computer Society. Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications , Amendment 6: Medium Access Control (MAC) Security Enhancements . IEEE Std 802.11i, July 2004 . L. S. C. of the IEEE Computer Society. Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, Amendment 6: Medium Access Control (MAC) Security Enhancements. IEEE Std 802.11i, July 2004."},{"key":"e_1_3_2_1_19_1","volume-title":"IEEE Networks Conf. (Joint IEEE ICN 2002 and IEEE ICWLHN)","author":"Pack S.","year":"2002","unstructured":"S. Pack and Y. Choi . Fast Inter-AP Hando using Predictive-Authentication Scheme in a Public Wireless LAN . In IEEE Networks Conf. (Joint IEEE ICN 2002 and IEEE ICWLHN) , Aug. 2002 . S. Pack and Y. Choi. Fast Inter-AP Hando using Predictive-Authentication Scheme in a Public Wireless LAN. In IEEE Networks Conf. (Joint IEEE ICN 2002 and IEEE ICWLHN), Aug. 2002."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2005.1424748"},{"key":"e_1_3_2_1_21_1","volume-title":"IETF HOKEY WG Internet-Draft","author":"Salowey J.","year":"2007","unstructured":"J. Salowey , L. Dondeti , V. Narayanan , and M. Nakhjiri . Specification for the Derivation of Root Keys from an Extended Master Session Key (EMSK) . IETF HOKEY WG Internet-Draft , Nov. 2007 . draft-ietf-hokey-emsk-hierarchy-02. J. Salowey, L. Dondeti, V. Narayanan, and M. Nakhjiri. Specification for the Derivation of Root Keys from an Extended Master Session Key (EMSK). IETF HOKEY WG Internet-Draft, Nov. 2007. draft-ietf-hokey-emsk-hierarchy-02."},{"key":"e_1_3_2_1_22_1","first-page":"1933","volume-title":"CAPWAP Handover Protocol. In IEEE Int. Conf. on Communications (ICC'06)","volume":"4","author":"Sarikaya B.","year":"2006","unstructured":"B. Sarikaya and X. Zheng . CAPWAP Handover Protocol. In IEEE Int. Conf. on Communications (ICC'06) , volume 4 , pages 1933 -- 1938 , June 2006 . B. Sarikaya and X. Zheng. CAPWAP Handover Protocol. In IEEE Int. Conf. on Communications (ICC'06), volume 4, pages 1933--1938, June 2006."},{"key":"e_1_3_2_1_23_1","volume-title":"June","author":"Team T. A.","year":"2006","unstructured":"T. A. Team . Automated Validation of Internet Security Protocols and Applications (AVISPA) v1.1 User Manual , June 2006 . T. A. Team. Automated Validation of Internet Security Protocols and Applications (AVISPA) v1.1 User Manual, June 2006."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.12921\/cmst.2005.11.02.169-173"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/MOBIQUITOUS.2005.46"}],"event":{"name":"MSWiM '08: The 11th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems","sponsor":["ACM Association for Computing Machinery","SIGSIM ACM Special Interest Group on Simulation and Modeling"],"location":"Vancouver British Columbia Canada","acronym":"MSWiM '08"},"container-title":["Proceedings of the 4th ACM symposium on QoS and security for wireless and mobile networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1454586.1454592","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,12]],"date-time":"2023-01-12T05:43:53Z","timestamp":1673502233000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1454586.1454592"}},"subtitle":["back to the basis"],"short-title":[],"issued":{"date-parts":[[2008,10,27]]},"references-count":25,"alternative-id":["10.1145\/1454586.1454592","10.1145\/1454586"],"URL":"https:\/\/doi.org\/10.1145\/1454586.1454592","relation":{},"subject":[],"published":{"date-parts":[[2008,10,27]]},"assertion":[{"value":"2008-10-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}