Recommendations for wireless network security policy: an analysis and classification of current and emerging threats and solutions for different organisations
暂无分享,去创建一个
[1] William A. Arbaugh,et al. Real 802.11 Security: Wi-Fi Protected Access and 802.11i , 2003 .
[2] Thomas Maufer. A Field Guide to Wireless LANs for Administrators and Power Users , 2003 .
[3] Henry L. Owen,et al. Wireless intrusion detection and response , 2003, IEEE Systems, Man and Cybernetics SocietyInformation Assurance Workshop, 2003..
[4] Lee Barken. How Secure is Your Wireless Network? Safeguarding Your Wi-Fi LAN , 2003 .
[5] Suen Yek,et al. An analysis of security in 802.11b and 802.11g wireless networks in Perth, WA , 2004, Australian Computer, Network & Information Forensics Conference.
[6] Sue Webb,et al. Growth in the Deployment and Security of 802.11b Wireless Local Area Networks in Perth, Western Australia , 2004, Australian Computer, Network & Information Forensics Conference.
[7] Adi Shamir,et al. Weaknesses in the Key Scheduling Algorithm of RC4 , 2001, Selected Areas in Cryptography.