1 |
The International Engineering Consortium, 'EAP Methods for 802.11 Wireless LAN Security', Web ProForum Tutorials, http://www.iec.org/online/ tutorials/eap_methods/to pic04.html
|
2 |
T. Dierks and C. Allen, 'The TLS Protocol', IETF RFC 2246, 1999
|
3 |
B. Schneier, Applied Cryptography, 2nd Ed. Wiley, 1996, pp. 171-173
|
4 |
L. Blunk and J. Vollbrecht, 'PPP Extensible Authentication Protocol (EAP),' IETF RFC 2284, March 1998
|
5 |
A. Palekar, et al., 'Protected EAP Protocol (PEAP)', IETF draft, July 2004
|
6 |
S. Bosworth and M.E. Kabay (editors), Computer Security Handbook, Wiley, 4th Ed., 2002
|
7 |
IETF Public-Key Infrastructure (X.509) charter: www.ietf.org/html.charters/pkix-ch arter.html
|
8 |
W. Simpson, 'PPP Challenge Handshake authentication Protocol (CHAP)', IETF RFC 1994, Aug. 1996
|
9 |
P. Funk and S. Blake-Wilson, 'EAP Tunneled TLS Authentication Protocol (EAP-TTLS)', IETF draft, July 2004
|