Tài liệu tham khảo |
Loại |
Chi tiết |
[1] Adam Stubblefield, John Ioannidis, Aviel D. Rubin (Aug 21, 2001),“Using the Fluhrer, Martin and Shamir Attack to Break WEP”, AT&T Labs |
Sách, tạp chí |
Tiêu đề: |
Using the Fluhrer, Martin and Shamir Attack to Break WEP |
|
[2] Alberto Onaghi, Marco Valleri (2003), “Man in the middle attacks”, Blackhat Conference - Europe |
Sách, tạp chí |
Tiêu đề: |
Man in the middle attacks |
Tác giả: |
Alberto Onaghi, Marco Valleri |
Năm: |
2003 |
|
[3] Brett A. Becker (2005), “802.11 Wireless Network Visualization and Case Study: Lawrence, KS”, University of Kansas, Lawrence, Kansas |
Sách, tạp chí |
Tiêu đề: |
802.11 Wireless Network Visualization and CaseStudy: Lawrence, KS |
Tác giả: |
Brett A. Becker |
Năm: |
2005 |
|
[4] Cherita Corbett, “Security for 802.11 Wireless Networks - Current Flaws, New Standards, and Today’s Alternatives”, Dept. of Electrical and Computer Engineering, Georgia Institute of Technology |
Sách, tạp chí |
Tiêu đề: |
Security for 802.11 Wireless Networks - Current Flaws,New Standards, and Today’s Alternatives |
|
[5] Christian Barnes, Tony Bautts, Donal Lloyd, Eric Ouellet, Jeffrey Posluns, David M. Zendzian, Neal O’Farell, “Hack Proofing Your Wireless Network”, SYNGRESS |
Sách, tạp chí |
Tiêu đề: |
Hack Proofing Your WirelessNetwork |
|
[6] Cisco Systems (2002), “A Comprehensive Review of 802.11 Wireless LAN Security and the Cisco Wireless Suite ” |
Sách, tạp chí |
Tiêu đề: |
A Comprehensive Review of 802.11 Wireless LANSecurity and the Cisco Wireless Suite |
Tác giả: |
Cisco Systems |
Năm: |
2002 |
|
[8] Edney.book (July 1, 2003), “Chapter 8: Access Control: IEEE 802.1X, EAP, and RADIUS” |
Sách, tạp chí |
Tiêu đề: |
Chapter 8: Access Control: IEEE 802.1X,EAP, and RADIUS |
|
[9] Fahim M Godil (April 24, 2004), “Security for Difference Wireless Networks”, CprE537 |
Sách, tạp chí |
Tiêu đề: |
“Security for Difference WirelessNetworks” |
|
[10] IEEE Computer Soceity (Oct 25, 2001), “Port-Based Network Access Control” |
Sách, tạp chí |
Tiêu đề: |
Port-Based Network AccessControl |
|
[11] IEEE Computer Society (July 2004), “Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications” |
Sách, tạp chí |
Tiêu đề: |
Part 11: Wireless LAN MediumAccess Control (MAC) and Physical Layer (PHY) Specifications |
|
[12] Jesse Walker (2002), “802.11 Security Series. Part II: The Temporal Key Integrity Protocol (TKIP)”, Network Security Architect, Platform Networking Group, Intel Corporation |
Sách, tạp chí |
Tiêu đề: |
802.11 Security Series. Part II: The Temporal KeyIntegrity Protocol (TKIP)” |
Tác giả: |
Jesse Walker |
Năm: |
2002 |
|
[13] Jim Tiller (2000), “IPSec Virtual Private Networks: A Technical Review”, Lucent Technologies NetworkCare |
Sách, tạp chí |
Tiêu đề: |
IPSec Virtual Private Networks: A Technical Review |
Tác giả: |
Jim Tiller |
Năm: |
2000 |
|
[14] John Vollbrecht, Robert Moskowitz (2002), “Wireless LAN Access Control and Authentication”, Interlink Networks, Inc |
Sách, tạp chí |
Tiêu đề: |
Wireless LAN Access Controland Authentication |
Tác giả: |
John Vollbrecht, Robert Moskowitz |
Năm: |
2002 |
|
[15] Kjell Jorgen Hole, (December 29, 2004), “Indoor WLAN Design. Part IV:An Introduction to Wi-Fi Protected Access”, UIB |
Sách, tạp chí |
Tiêu đề: |
“Indoor WLAN Design. Part IV:"An Introduction to Wi-Fi Protected Access” |
|
[16] Loris Degioanni, (March 2000), “Development of an Architecture for Packet Capture and Network Traffic Analysis.”, Corso di Laurea in Ingegneria Informatica, Politecnico di Torino, Facoltà di Ingegneria |
Sách, tạp chí |
Tiêu đề: |
“Development of an Architecture forPacket Capture and Network Traffic Analysis.” |
|
[17] Martin Dunmore, John Floroiu, Reinhard Ruppelt, Klaas Wierenga, Renzo Davoli (Jun 30, 2004), “Framework for the Support of IPv6 Wireless LAN, Version 2”, 6net |
Sách, tạp chí |
Tiêu đề: |
Framework for the Support of IPv6 Wireless LAN,Version 2 |
|
[18] Mathew Gast, (April 2002), “802.11 Wireless Networks: The Definitive Guide.”, O’Reilly |
Sách, tạp chí |
Tiêu đề: |
“802.11 Wireless Networks: The DefinitiveGuide.” |
|
[19] Nikita Borisov, Ian Goldberg, David Wagner (June 2003), “Intercepting Mobile Communications: The Insecurity of 802.11” |
Sách, tạp chí |
Tiêu đề: |
InterceptingMobile Communications: The Insecurity of 802.11 |
|
[20] Russell Dean Vines (2002), “Wireless Security Essentials”, Wiley Publishing, Inc, IndianaPolis, Indiana |
Sách, tạp chí |
Tiêu đề: |
Wireless Security Essentials |
Tác giả: |
Russell Dean Vines |
Năm: |
2002 |
|
[21] Sangram Gayal, Dr. S. A. Vetha Manickam (2003), “Wireless LAN Security. Today and Tomorrow”, Center Information and Network Security, Pune University |
Sách, tạp chí |
Tiêu đề: |
“Wireless LANSecurity. Today and Tomorrow” |
Tác giả: |
Sangram Gayal, Dr. S. A. Vetha Manickam |
Năm: |
2003 |
|