|
[1] B. Mansfiedld, “WLAN & 802.11 SECURITY,” Internet Developers Group, June 18, 2002. [2] M. S. Gast, 802.11 Wireless Networks, O’REILLY, April 2002. [3] R. J. Boncella, “Wireless Security: An OVERVIEW,” Eighth Americas Conference on Information Systems, 2002. [4] IEEE, “Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specification:Specification for Enhanced Security,” IEEE Standard 802.11i/D2.0, March 2002. [5] Borisov, Nikita, I. Goldberg and D. Wagner, “Security of WEP Algorithm”, http://www.isaac.cs.berkeley.edu/isaac/wep-faq.htm [6] 經濟部九十三年度無線寬頻網路示範應用計畫文件,http://www.pwlan.org.tw/upload/doc/20040429192946.doc [7] A. Mishra and W. A. Arbaugh, “An Initial Security Analysis of the IEEE 802.1X Standard,” Department of Computer Science University of Maryland, Feb 6, 2002, CS-TR-43228. [8] W. Stallings, “Cryptography and Network Security Principles and Practice, Second Edittion” ,1999 [9] D. Hulton, “Practical Exploitation of RC4 Weaknesses in WEP Environments ,http://www.dachb0den.com/projects/bsd-airtools.html” [10] T. Newsham''s web page about WEP problems: http://www.lava.net/~newsham/wlan/ [11] S. Fluhrer, I. Mantin and A. Shamir, “Weaknesses in the Key Scheduling Algorithm of RC4,” Eighth Annual Workshop on Selected Areas in Cryptography, August 2001. [12] IEEE, “IEEE Standard for Local and metropolitan area networks - Port-based Networks Access Control,” IEEE Standard 802.1X, 2001 [13] C. Rigney, “Remote Authentication Dial In User Service (RADIUS)”, RFC 2865, June 2000. [14] Blunk, L., Vollbrecht, “PPP Extensible Authentication Protocol (EAP) ”, RFC 2284, March 1998 [15] A. Sulmicki, “HOWTO on EAP/TLS authentication between FreeRadius and XSupplicant”, http://www.missl.cs.umd.edu/wireless/eaptls/. [16] B. Aboba, “PPP EAP-TLS Authentication Protocol”, IEFT RFC 2716 [17] 賴溪松、邱榮輝、林祝興、盧而輝、張克章,電子簽章應用與實習,旗標出版股份有限公司,2003年。 [18] 內政部憑證管理中心, http://moica.nat.gov.tw/ [19] WAPI打造安全互聯的公共無線局域網, http://tech.sina.com.cn/other/2003-08-26/0934225352.shtml [20] A. Stubblefield, J. Ioannidis, and A. Rubin, "Using the Fluhrer, Mantin, and Shamir Attack to Break WEP", http://www.cs.rice.edu/~astubble/wep_attack.pdf [21] W. A. Arbaugh, N. Shankar, Y. C. J. Wan, “Your Wireless Network has No Clothes”, http://www.cs.umd.edu/~waa/wireless.pdf [22] B. Lloyd, W. Simpson, "PPP Authentication Protocols(PAP)" RFC 1334, October 1992. [23] W. Simpson, “ PPP Challenge Handshake Authentication Protocol (CHAP)”, RFC 1994, August 1996. [24] 國家高速網路與計算中心校園無線漫遊機制整合實驗與推廣計畫網頁,http://wlanrc.nchc.org.tw/ [25] J. Edney and W. A. Arbaugh, Real 802.11 Security Wi-Fi Protected Access and 802.11i, Addison-Wesley, July 2003.
|