{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,4]],"date-time":"2022-04-04T11:17:41Z","timestamp":1649071061479},"reference-count":13,"publisher":"Scientific Research Publishing, Inc.","issue":"02","license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CN"],"published-print":{"date-parts":[[2010]]},"DOI":"10.4236\/cn.2010.22020","type":"journal-article","created":{"date-parts":[[2010,7,14]],"date-time":"2010-07-14T08:40:03Z","timestamp":1279096803000},"page":"134-137","source":"Crossref","is-referenced-by-count":1,"title":["An Assessment of WiMax Security"],"prefix":"10.4236","volume":"02","author":[{"given":"Sanjay P.","family":"Ahuja","sequence":"first","affiliation":[]},{"given":"Nicole","family":"Collier","sequence":"additional","affiliation":[]}],"member":"2751","reference":[{"key":"ref","unstructured":"A. S. Tanenbaum, \u201cComputer Networks,\u201d 4th Edition, Prentice Hall, Inc., New Jersey, 2006."},{"key":"ref","unstructured":"http:\/\/en.wikipedia.org\/wiki\/WiMax"},{"key":"ref","unstructured":"S. P. Ahuja and P. K. Potti, \u201cEvolution of Wireless LAN Security,\u201d International Conference on Parallel and Dis-tributed Processing Techniques and Applications, Las Vegas, 24-17 July 2008."},{"key":"ref","unstructured":"T. Sanders, \u201cPremium Five Essential Elements of WiMax Security,\u201d WiMax.com, November 2007."},{"key":"ref","unstructured":"http:\/\/myhsc.pbwiki.com\/wimax::aaa"},{"key":"ref","unstructured":"P. Korsenlowski, \u201cStaying Safe in a WiMax World,\u201d TechNewsWorld.com, 27 February 2007."},{"key":"ref","doi-asserted-by":"crossref","unstructured":"M. Barbeau, J. Hall and E. Kranakis, \u201cDetecting Imper-sonation Attacks in Future Wireless and Mobile Net-works,\u201d Secure Mobile Ad-hoc Networks and Sensors, Ottawa, 2006, pp. 80-95.","DOI":"10.1007\/11801412_8"},{"key":"ref","unstructured":"M. McDowell, \u201cUnderstanding Denial of Service At-tacks,\u201d National Cyber Alert System, 1 August 2007."},{"key":"ref","unstructured":"K. Youngwook, L. Hyoung-Kyu and B. Saewoong, \u201cShared Authentication Information for Preventing DDoS Attacks in Mobile WiMax Networks,\u201d Proceedings of the 5th Consumer Communications and Networking Confe-rence, Las Vegas, 10-12 January 2008."},{"key":"ref","unstructured":"N. Beacham, \u201cMan in the Middle (MITM) Attacks,\u201d Technology and More, 28 June 2008."},{"key":"ref","unstructured":"J. M. Hartley, \u201cWiFi and WiMax Protocols of Security,\u201d December 2008. http:\/\/softwarecommunity.intel.com\/articles\/eng\/3708.htm"},{"key":"ref","unstructured":"R. Millman, \u201cSecurity Experts See Vulnerablilites in WiMax,\u201d WiMax.com, 17 October 2006."},{"key":"ref","unstructured":"M. Barbeau, \u201cThreats: Threats to WiMax,\u201d http:\/\/www. freewimaxinfo.com\/physical-layer.html."}],"container-title":["Communications and Network"],"original-title":[],"link":[{"URL":"http:\/\/www.scirp.org\/journal\/PaperDownload.aspx?DOI=10.4236\/cn.2010.22020","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/www.scirp.org\/journal\/doi.aspx?DOI=10.4236\/cn.2010.22020","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/www.scirp.org\/journal\/doi.aspx?DOI=10.4236\/cn.2010.22020","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T01:42:12Z","timestamp":1559266932000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.scirp.org\/journal\/doi.aspx?DOI=10.4236\/cn.2010.22020"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"references-count":13,"journal-issue":{"issue":"02","published-print":{"date-parts":[[2010]]}},"URL":"https:\/\/doi.org\/10.4236\/cn.2010.22020","relation":{},"ISSN":["1949-2421","1947-3826"],"issn-type":[{"value":"1949-2421","type":"print"},{"value":"1947-3826","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010]]}}}