2IEEE Std 802.11.Standards for local and metropolitan area networks:Wireless LAN medium access control (MAC) and physical layer (PHY)specifications,1999[S]. 被引量:1
3Regan Kevin.Wireless LAN security[J].Network Security 2003,2003(1):7-9. 被引量:1
4Jesse R walker.Unsafe at any key size:An analysis of the WEP encapsulation[S].DOC:IEEE 802.11-00/362,2000. 被引量:1
5Fluhrer S,Mantin I,Shamir A.Weaknesses in the key scheduling algorithm of RC4[R].Toronto,Canada:In Eighth Annual Workshop on Selected Areas in Cryptography,2001-08.3-24. 被引量:1
6Doug Whiting,Russ Housley,Neils Ferguson.TKIP with 48-bits Ivs IEEE 802.11-02/229r0 January 17,2002[EB/OL].http://grouper.ieee.org/groups/80 2/11. 被引量:1
7Wool Avishai.A note on the fragility of the "Michael" message integrity code[J].IEEE Transactions on Wireless Communications,2004,3(5):1459-1462. 被引量:1
8Weatherspoon S.Overview of IEEE 802.11b Security[J].Intel Technology,2000,Q2:1-5. 被引量:1
9R J Boncella.Wireless Security:An Overview[J].Communication of the Association for Information Systems,2002,9:269-282. 被引量:1