1 |
Jonghyun Baek, SoonTai Park, "국내 무선랜(WiFi) 보안 운영 현황 및 정책 방향", Korea Institute Of Information Security And Cryptology, REVIEW OF KIISC 21(1), 2011.2, 44-50 (7 pages)
|
2 |
R. Housley, D. Whiting and N. Ferguson, "Counter with CBC-MAC (CCM) : AES Mode of Operation,Proposed to NIST,June 2002.
|
3 |
S.H. Kim, S. Lee, H.C. Kwon, G.I. An, and H.S Cho, "Technologies for Next Generation Wireless LAN Security," 2013 Electronics and Telecommunications Trends pp. 100-109
|
4 |
D. Inoue, R. Nomura, and M. Kuroda, "Transient MAC address scheme for untraceability and DOS attack resiliency on wireless network," in Proc. Wireless Telecommun. Symp., pp. 15-23, Pomona, U.S.A., Apr. 2005
|
5 |
IEEE, "IEEE Standard for Information technology- Telecommunications and information exchange between systems - Local and metropolitan area networks - Specific requirements Part 11: Wireless LAN Medium Access Control(MAC) and Physical Layer(PHY) specifications Amendment 6: Medium Access Control (MAC) Security Enhancements", IEEE Std 802.11i, July 2004.
|
6 |
AirTight Network, "Airtight network wireless security," AirTight White Paper, 2012.
|
7 |
HP,"802.11w's Impacts on WIPS" HP White Paper, 2014.
|
8 |
IEEE 802.11, "Standard for Information Technology Telecommunications and Information Exchange between Systems Local and Metropolitan area Networks-Specific Requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, Amendment 4: Protected Management Frames" 2009.
|