1 |
Joshua Hill, "An Analysis of the RADIUS Authentication Protocol", Joshua Hill, pp. 1-12, 2001.
|
2 |
Joseph Davies, RADIUS Protocol Security and Best Practices, Microsoft Corporation, 2002.
|
3 |
WIRE1x, "Open Source Implementation of IEEE 802.1X", http://wire.cs.nthu.edu.tw/wire1x
|
4 |
OpenSSL Project, Open Source implementing the Secure Sockets Layer(SSL v2/v3) and Transport Layer Security(TLS v1), ttp:/www.openssl.org/
|
5 |
FreeRADIUS Project, Open Source Implementation of RADIUS, http://www.freeradius.org/
|
6 |
양형규, "무선 PKI 환경에서 보안 모듈에 관한 고찰", 강남대학교 산학기술연구소 논문집, 제 14호, pp. 123-140, 2002.
|
7 |
William A. Arbaugh, N. Shankar, Y.C. Justin Wan, "Your 802.11 Wireless Network has No Clothes", Proceedings of the First IEEE International Conference on Wireless LANs and Home Networks, pp. 1-13, 2001.
|
8 |
J.-C. Chen, M.-C. Jiang, Y.-W. Liu, "Wireless LAN Security and IEEE 802.11i", IEEE Wireless Communications, pp. 1-19, 2004.
|
9 |
송창렬, 정병호, 조기환, "무선랜 보안구조," 한국정보과학회지, 제 20권 4호, pp. 5-13, 2002
|
10 |
강유성, 오경희, 정병호, "무선랜 보안기술의 진화 동향 및 전망", 전자통신동향분석, 제 18권 제4호, pp. 36-46, 2003.
|
11 |
Arunesh Mishra, William A. Arbaugh, "An Initial Security Analysis of the IEEE 802.1X Standard", University of Maryland, pp. 1-12, 2002.
|
12 |
J.R. Walker, "Unsafe at Any Key Size; An Analysis of the WEP Encapsulation", IEEE 802.11 Committee, pp. 1-9, 2000.
|
13 |
IEEE, Draft P802.1X/D11: Standard for Port based Network Access Control, IETF Network Working Group, 2001.
|
14 |
P. Funk, S. Blake-Wilson, EAP Tunneled TLS Authentication Protocol (EAP-TTLS), IETF PPPEXT Working Group, 2005.
|
15 |
L. Blunk, J. Vollbrecht, PPP Extensible Authentication Protocol(EAP), IETF Network Working Group, 1998.
|