Countering rogues in wireless networks
暂无分享,去创建一个
[1] Joshua Wright,et al. Detecting Wireless LAN MAC Address Spoofing , 2003 .
[2] William A. Arbaugh,et al. An Initial Security Analysis of the IEEE 802.1X Standard , 2002 .
[3] Brian Hatch,et al. Building Linux Virtual Private Networks (Vpns) , 2002 .
[4] John Ioannidis,et al. Using the Fluhrer, Mantin, and Shamir Attack to Break WEP , 2002, NDSS.
[5] David R. Cheriton,et al. DoS and authentication in wireless public access networks , 2002, WiSE '02.
[6] Paramvir Bahl,et al. Secure wireless Internet access in public places , 2001, ICC 2001. IEEE International Conference on Communications. Conference Record (Cat. No.01CH37240).
[7] Adi Shamir,et al. Weaknesses in the Key Scheduling Algorithm of RC4 , 2001, Selected Areas in Cryptography.
[8] Partha Dasgupta,et al. Secure wireless gateway , 2002, WiSE '02.