{"id":"https://openalex.org/W1804829956","doi":"https://doi.org/10.1007/978-3-540-31979-5_3","title":"Modeling and Evaluation of Security Architecture for Wireless Local Area Networks by Indexing Method: A Novel Approach","display_name":"Modeling and Evaluation of Security Architecture for Wireless Local Area Networks by Indexing Method: A Novel Approach","publication_year":2005,"publication_date":"2005-01-01","ids":{"openalex":"https://openalex.org/W1804829956","doi":"https://doi.org/10.1007/978-3-540-31979-5_3","mag":"1804829956"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-540-31979-5_3","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-540-31979-5_3","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Debabrata Nayak","orcid":null},"institutions":[{"id":"https://openalex.org/I1287339526","display_name":"Reserve Bank of India","ror":"https://ror.org/04w0b7z78","country_code":"IN","type":"other","lineage":["https://openalex.org/I1287339526"]},{"id":"https://openalex.org/I150312865","display_name":"Institute for Development and Research in Banking Technology","ror":"https://ror.org/00ta0g865","country_code":"IN","type":"government","lineage":["https://openalex.org/I150312865"]},{"id":"https://openalex.org/I162827531","display_name":"Indian Institute of Technology Bombay","ror":"https://ror.org/02qyf5152","country_code":"IN","type":"education","lineage":["https://openalex.org/I162827531"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Debabrata Nayak","raw_affiliation_strings":["Senior IEEE Member, Institute for Development and Research in Banking Technology, IDRBT, Reserve Bank of India, Hyderabad","Student IEEE Member, IIT Mumbai, Kanwal Rekhi School of Information Technology, IIT Bombay, Powai, 400076, India"],"affiliations":[{"raw_affiliation_string":"Senior IEEE Member, Institute for Development and Research in Banking Technology, IDRBT, Reserve Bank of India, Hyderabad","institution_ids":["https://openalex.org/I1287339526","https://openalex.org/I150312865"]},{"raw_affiliation_string":"Student IEEE Member, IIT Mumbai, Kanwal Rekhi School of Information Technology, IIT Bombay, Powai, 400076, India","institution_ids":["https://openalex.org/I162827531"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5013504107","display_name":"Deepak B. Phatak","orcid":null},"institutions":[{"id":"https://openalex.org/I162827531","display_name":"Indian Institute of Technology Bombay","ror":"https://ror.org/02qyf5152","country_code":"IN","type":"education","lineage":["https://openalex.org/I162827531"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"D. B. Phatak","raw_affiliation_strings":["Student IEEE Member, IIT Mumbai, Kanwal Rekhi School of Information Technology, IIT Bombay, Powai, 400076, India"],"affiliations":[{"raw_affiliation_string":"Student IEEE Member, IIT Mumbai, Kanwal Rekhi School of Information Technology, IIT Bombay, Powai, 400076, India","institution_ids":["https://openalex.org/I162827531"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5012324244","display_name":"V.P. Gulati","orcid":"https://orcid.org/0009-0008-9460-3270"},"institutions":[{"id":"https://openalex.org/I1287339526","display_name":"Reserve Bank of India","ror":"https://ror.org/04w0b7z78","country_code":"IN","type":"other","lineage":["https://openalex.org/I1287339526"]},{"id":"https://openalex.org/I150312865","display_name":"Institute for Development and Research in Banking Technology","ror":"https://ror.org/00ta0g865","country_code":"IN","type":"government","lineage":["https://openalex.org/I150312865"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"V. P. Gulati","raw_affiliation_strings":["Senior IEEE Member, Institute for Development and Research in Banking Technology, IDRBT, Reserve Bank of India, Hyderabad"],"affiliations":[{"raw_affiliation_string":"Senior IEEE Member, Institute for Development and Research in Banking Technology, IDRBT, Reserve Bank of India, Hyderabad","institution_ids":["https://openalex.org/I1287339526","https://openalex.org/I150312865"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I1287339526","https://openalex.org/I150312865","https://openalex.org/I162827531"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":0.6569,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.71983168,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"25","last_page":"35"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11158","display_name":"Wireless Networks and Protocols","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11158","display_name":"Wireless Networks and Protocols","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8588335514068604},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.7429025173187256},{"id":"https://openalex.org/keywords/testbed","display_name":"Testbed","score":0.6823482513427734},{"id":"https://openalex.org/keywords/ipsec","display_name":"IPsec","score":0.6726954579353333},{"id":"https://openalex.org/keywords/wi-fi","display_name":"Wi-Fi","score":0.5494968295097351},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.5101199746131897},{"id":"https://openalex.org/keywords/enterprise-information-security-architecture","display_name":"Enterprise information security architecture","score":0.4652474820613861},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.46165192127227783},{"id":"https://openalex.org/keywords/security-association","display_name":"Security association","score":0.41936206817626953},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.41315340995788574},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.3797655999660492},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.37497955560684204},{"id":"https://openalex.org/keywords/network-access-control","display_name":"Network Access Control","score":0.36834025382995605},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2993725538253784},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.26544085144996643},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.20034492015838623},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.10432085394859314},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.09967231750488281},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.09634846448898315}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8588335514068604},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.7429025173187256},{"id":"https://openalex.org/C31395832","wikidata":"https://www.wikidata.org/wiki/Q1318674","display_name":"Testbed","level":2,"score":0.6823482513427734},{"id":"https://openalex.org/C67396069","wikidata":"https://www.wikidata.org/wiki/Q210214","display_name":"IPsec","level":3,"score":0.6726954579353333},{"id":"https://openalex.org/C508800617","wikidata":"https://www.wikidata.org/wiki/Q29643","display_name":"Wi-Fi","level":4,"score":0.5494968295097351},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.5101199746131897},{"id":"https://openalex.org/C31139447","wikidata":"https://www.wikidata.org/wiki/Q5380386","display_name":"Enterprise information security architecture","level":2,"score":0.4652474820613861},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.46165192127227783},{"id":"https://openalex.org/C130881749","wikidata":"https://www.wikidata.org/wiki/Q586894","display_name":"Security association","level":5,"score":0.41936206817626953},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.41315340995788574},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.3797655999660492},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.37497955560684204},{"id":"https://openalex.org/C14982408","wikidata":"https://www.wikidata.org/wiki/Q11006334","display_name":"Network Access Control","level":4,"score":0.36834025382995605},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2993725538253784},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.26544085144996643},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.20034492015838623},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.10432085394859314},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.09967231750488281},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.09634846448898315}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/978-3-540-31979-5_3","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-540-31979-5_3","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"pmh:oai:dsapce.library.iitb.ac.in:100/1957","is_oa":false,"landing_page_url":"http://dspace.library.iitb.ac.in/xmlui/handle/10054/15191","pdf_url":null,"source":{"id":"https://openalex.org/S4306400899","display_name":"DSpace (IIT Bombay)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I162827531","host_organization_name":"Indian Institute of Technology Bombay","host_organization_lineage":["https://openalex.org/I162827531"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"1st Information Security Practice and Experience Conference (ISPEC 2005),Singapore, SINGAPORE,APR 11-14, 2005","raw_type":"Article; Proceedings Paper"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W329998640","https://openalex.org/W1526424631","https://openalex.org/W1526676231","https://openalex.org/W1966819490","https://openalex.org/W1971745673","https://openalex.org/W2023077117","https://openalex.org/W2027356754","https://openalex.org/W2110339663","https://openalex.org/W2117027156","https://openalex.org/W2121268634","https://openalex.org/W2155104305","https://openalex.org/W2155326273","https://openalex.org/W2170394762","https://openalex.org/W2171205439","https://openalex.org/W2610952818","https://openalex.org/W2615959975","https://openalex.org/W2914267965","https://openalex.org/W4232528527","https://openalex.org/W4297955515","https://openalex.org/W4300978744"],"related_works":["https://openalex.org/W1728437086","https://openalex.org/W2525022008","https://openalex.org/W2397473725","https://openalex.org/W2352161298","https://openalex.org/W2102887765","https://openalex.org/W2368070557","https://openalex.org/W2357712311","https://openalex.org/W2363703667","https://openalex.org/W2390575866","https://openalex.org/W2373747252"],"abstract_inverted_index":null,"counts_by_year":[{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":2},{"year":2012,"cited_by_count":1}],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2025-10-10T00:00:00"}
