1 |
Kevin Benton, The Evolution of 802.11 Wireless Security, UNLV Informatics, Spring 2010. https://benton.pub/research/benton_wireless.pdf
|
2 |
Wi-Fi Protected Access II (WPA2), IEEE 802.11i-2004.
|
3 |
Michael B. Jones and Dick Hardt, "The OAuth 2.0 authorization framework: bearer token usage," RFC 6750, Oct. 2012.
|
4 |
Michael B. Jones, John Bradley, and Nat Sakimura, "JSON web token (JWT)," RFC 7519, May 2015.
|
5 |
Justin Richer, William Mills, Hannes Tschofenig, and Phil Hunt, "OAuth 2.0 message authentication code (MAC) tokens," Internet-Draft, Jan. 15, 2014. https://tools.ietf.org/id/draft-ietf-oauth-v2-http-mac-05.html
|
6 |
Eric Rescorla, "HTTP over TLS," RFC 2818, May 2000.
|
7 |
Byoungcheon Lee, "Strengthening of token authentication using time-based randomization," Journal of Security Engineering, 14(2), pp. 103-114, Apr. 2017.
DOI
|
8 |
Dan Harkins, Simultaneous Authentication of Equals: A Secure, Password-Based Key Exchange for Mesh Networks, 2008 Second International Conference on Sensor Technologies and Applications (sensorcomm 2008), pp. 839-844, Aug. 2008.
|
9 |
Dan Harkins and Warren Kumari, Opportunistic Wireless Encryption, RFC 8110, Mar. 2017.
|
10 |
Mathy Vanhoef and Frank Piessens, Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2, Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 1313-1328, Nov. 2017.
|
11 |
Byoungcheon Lee, "Stateless randomized token authentication for performance improvement of OAuth 2.0 MAC token authentication", Journal of The Korea Institute of Information Security & Cryptology, 28(6), pp. 1343-1354, Dec. 2018.
DOI
|
12 |
WPA3, https://www.wi-fi.org/
|
13 |
Scott Fluhrer, Itsik Mantin, and Adi Shamir, "Weaknesses in the Key Scheduling Algorithm of RC4", Selected Areas of Cryptography: SAC 2001, Lecture Notes in Computer Science 2259, pp. 1-24, Mar. 2001.
|