1 |
Walker. J., "Overview of 802.11 security", http://grouper.ieee.org/groups/802/15/pub/2 001/Mar01/01154r0p802-15_TG3%-Overvie w-of-802-11-Security.ppt, March 2001
|
2 |
Walker. J., "Unsafe at any key size : an a nalysis of the WEP encapsulation", Tech, Rep. 03628E, IEEE 802.11 committee, Mar ch 2000. http ://grouper.ieee.org/groups/80 2/11/Documents/Document Holder/0-362.zi p
|
3 |
Borisov. N., I. Goldberg, and D. Wagner, " Interception Mobile Communications : The Insecurity of 802.11", In Proceedings of the Seventh Annual International Conference on Mobile Computing and Networking, pp 180-188, 2001
|
4 |
LAN MAN Standards Committee of the I EEE Computer Society, Wireless LAN me dium access control(MAC) and physical la yer(PHY) specification, IEEE Standard 80 2.11, 1999 Edition, 1999
|
5 |
William. A. Arbaugh, N. Shankar, and Y. C. Justin Wan, "Your 802.11 Wireless Net work has No Clothes", In Proceedings of the First IEEE International Conference o n Wireless LANs and Home Networks, D ecember 2001
|