Security protocol for IEEE 802.11 wireless local area network
暂无分享,去创建一个
[1] Vijay K. Garg,et al. Wireless and Personal Communications Systems , 2000 .
[2] Rodger E. Ziemer,et al. Principles of communications : systems, modulation, and noise , 1985 .
[3] B. Clifford Neuman,et al. Security , Payment , and Privacy for Network Commerce , 1995 .
[4] Hugo Krawczyk,et al. Security issues in a CDPD wireless network , 1995, IEEE Wirel. Commun..
[5] Ashar Aziz,et al. Privacy and authentication for wireless local area networks , 1994, IEEE Personal Communications.
[6] Martín Abadi,et al. A logic of authentication , 1989, Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences.
[7] Ronald L. Rivest,et al. The MD5 Message-Digest Algorithm , 1992, RFC.
[8] Li Gong,et al. Multicast security and its extension to a mobile environment , 1995, Wirel. Networks.
[9] 염흥렬,et al. [서평]「Applied Cryptography」 , 1997 .
[10] Jr. Regis J. Bates,et al. Wireless networked communications: concepts, technology, and implementation , 1994 .
[11] F. D. Natali,et al. Spread-spectrum technology for commercial applications , 1994 .
[12] Hideki Imai,et al. Information Security Aspects of Spread Spectrum Systems , 1994, ASIACRYPT.
[13] B. Clifford Neuman,et al. A note on the use of timestamps as nonces , 1993, OPSR.
[14] Ross J. Anderson. UEPS - A Second Generation Electronic Wallet , 1992, ESORICS.
[15] Edward C. Prem. Wireless Local Area Networks , 2000 .
[16] Charles E. Perkins,et al. A Mobile Host Protocol Supporting Route Optimization and Authentication , 1995, IEEE J. Sel. Areas Commun..
[17] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.