|
[1]B. Aboba, L. Blunk, J. Vollbrecht, J. Carlson, and H. Levkowetz, “Extensible Authentication Protocol (EAP),” RFC 3748, Jun. 2004. [2]B. Aboba and D. Somon, “PPP EAP TLS Authentication Protocol,” RFC 2246, Oct. 1999. [3]T. Dierks and C. Allen, “The TLS Protocol Version 1.0,” RFC 2246, Jan. 1999. [4]C. He and J.C. Mishell, “Analysis of the 802.11i 4-Way Handshake,” Proceedings of the 3rd ACM Workshop on Wireless Security, Philadelphia, USA, pp. 43-50, Oct. 2004. [5]IEEE Standard 802.11i, “Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Medium Access Control (MAC) Security Enhancements,” Jul. 2003. [6]IEEE Standard 802.1X, “IEEE Standard for Local and Metropolitan Area Networks, Port-Based Network Access Control,” Oct. 2001. [7]R.H. Jan and Y.C. Huang, “Fast Pre-Authentication Based on IEEE 802.11i,” in Proceedings of the 2nd Workshop on Wireless, Ad Hoc, and Sensor Networks, Taoyuan, Taiwan, pp. 317-324. Aug. 2006. [8]L. Maccari, R. Fantacci, T. Pecorella, and F. Frosali, “Secure, Fast Handhoff Techniques for 802.1X Based Wireless Network,” Proceedings of the IEEE International Conference on Communications, pp. 3917-3922, Jun. 2006. [9]A. Mishra, M. Shin, and W. Arbaugh, “An Empirical Analysis of the IEEE 802.11 MAC Layer Handoff Process,” ACM SIGCOMM Computer Communication Review, Vol. 33, No. 2, pp. 93-102, Apr. 2003. [10] OpenSSL Project, http://www.openssl.org, 2007. [11] C. Rigney, S. Willens, A. Rubens, and W. Simpson, “Remote Authentication Dial in User Service (RADIUS),” RFC 2865, Jun. 2000. [12] W. Stallings, Cryptography and Network Security - Principles and Practices, Third Edition, May 2004. [13] X. Zheng, C. Chen, C.T. Huang, M.M. Matthews, and N. Santhapuri, “A Dual Authentication Protocol for IEEE 802.11 Wireless LANs,” in Proceedings of the 2nd Wireless Communication Systems, pp. 565-569, Sep. 2005.
|