1 |
James T. Geier, Jim Geier, 'Wireless LANs (2nd Edition),' SAMS, 2001
|
2 |
Nikita Borisov, Ian Goldberg, David Wagner, 'Intercepting Mobile Communications : The Insecurity of 802.11,' Proceedings of the 7th International Conference on Mobile Computing and Networking, July, 2001
DOI
|
3 |
'Port-based Network Access Control,' IEEE Standard 802.1x, June, 2001
|
4 |
L. Blunk, J. Vollbrecht, 'PPP Extensible Authentication Protocol (EAP),' IETF RFC2284, Mar., 1998
|
5 |
B. Aboba, D. Simon, 'PPP EAP TLS Authentication Protocol,' IETF RFC2716, Oct., 1999
|
6 |
Arunesh Mishra, William A. Arbaugh, 'An Initial Security Analysis of The IEEE 802.1X Standard,' Feb., 2002
|
7 |
Tom Katygiannis, Les Owens, 'Draft Wireless Network Security,' National Institute of Standards and Technology (NIST), 2002
|
8 |
'IEEE802.11b Wireless LAN Medium Access Control (MAC) and Physical Layer(PHY) Specification,' IEEE Standard 802.11b, 1999
|
9 |
S. Fluhrer, I. Martin, A. Shamir, 'Weaknesses in the key scheduling algorithm of rc4,' Eighth Annual Workshop on Selected Areas in Cryptography, Aug., 2001
|
10 |
Core SDI, 'crc32 compensation attack against ssh-1.5 http://www.core-sdi-com/soft/ssh/attacke.txt', 1995
|
11 |
D. Wagner and B. Schneier, 'Analysis of the SSL 3.0 protocol,' Proceddings of the 2nd USENIX Workshop on Electronic Commerce(EC-96), Nov., 1996
|
12 |
Arunesh Mishra, Nick L. Petroni, Jr, Bryan D. Payne, 'Open Source Implementation of 802.1x,' http://www.open1x.org, 2003
|
13 |
The Free RADIUS Project, http://www.freeradius.org, 2002
|
14 |
John Viega, Matt Messier, Pravir Chandra, 'Network Security with OpenSSL,' O'reilly, 2002
|