1. Housley, R. "Wireless LAN Security Solution Motives and Rationale." December 4 “5, 2002 , NIST WLAN Security Workshop Presentation, Vigil Security, LLC.
2. IEEE. "Status of Project IEEE 802.11i." Retrieved August 23, 2003 , from http://grouper.ieee.org/groups/802/11/Reports/tgiupdate.htm .
3. Sourceforge . " WEPCrack ." Retrieved August 23, 2002 , from http://wepcrack.sourceforge.net .
4. Shmoo. "AirSnort" Homepage. Retrieved August 23, 2002 , from http://airsnort.shmoo.com .
5. IEEE. Status of Project IEEE 802.11i. Retrieved August 23, 2003 from http://grouper.ieee.org/groups/802/11/Reports/tgiupdate.htm .
6. IEEE. "802.1x-Port-Based Network Access Control." Retrieved August 23, 2003 , from http://www.ieee802.org/1/pages/802.1x.html .
7. Condon, P., et al. "Request for Comments: 3580-IEEE 802.1X Remote Authentication Dial-In User Service (RADIUS) Usage Guidelines." Retrieved September 19, 2002 , from http://www.ietf.org/rfc/rfc3580.txt .
8. Cisco. "Application Note: Authentication with 802.1x and EAP Across Congested WAN Links." Retrieved August 23, 2003 , from http://www.cisco.com/en/US/netsol/ns110/ns175/ns176/ns178/networking_solutions_white_paper09186a00800a9e8e.shtml .
9. The reader is encouraged to visit http://www.ietf.org .
10. Aboba, B., and D. Simon. "RFC 2716-PPP EAP TLS Authentication Protocol." Retrieved August 23, 2003 , from http://www.faqs.org/rfcs/rfc2716.html .
11. Microsoft Knowledgebase Article 325725, "Protected EAP (PEAP) Support Added to Windows XP SP1 and Windows Server 2003," at http://support.microsoft.com/default.aspx?scid=kb;en-us;325725 .
12. The reader is encouraged to visit http://www.funk.com/radiouswlan for more information on this topic.
13. Blunk, L., and J. Vollbrecht. "RFC 2284 - PPP Extensible Authentication Protocol (EAP)." Retrieved August 23, 2003 , from http://www.faqs.org/rfcs/rfc2284.html .
14. Andersson, H., S. Josefsson., G. Zorn, D. Simon, and A. Palekar. "PPPEXT Working Group Internet ”DRAFT: Protected EAP Protocol (PEAP)." Retrieved August 23, 2003 , from http://www.globecom.net/ietf/draft/draft-josefsson-pppext-eaptls-eap-02.html .
15. Layer 2 Tunnelling Protocol Daemon. Retrieved August 23, 2003 , from http://www.12tpd.org
16. IETF. "IP Security Protocol (ipsec)." Retrieved August 23, 2003 , from http://www.ietf.org/html. charters /ipsec-charter.html .
17. SourceForge.net. "PPTP Client." Retrieved August 23, 2003 , from http://pptpclient.sourceforge.net .
18. Microsoft. "Point-Point Tunneling Protocol (PPTP) FAQ." Retrieved August 23, 2003 , from http://www.microsoft.com/ntserver/ProductInfo/faqs/PPTPfaq.asp .
19. See note 15.
20. Aalto, T. "IPv6 Authentication Header and Encapsulated Security Payload." Retrieved August 23, 2003 , from http://www.tml.hut.fi/Opinnot/Tik-110.551/1 .
21. Aalto, T. "IPv6 Authentication Header and Encapsulated Security Payload." Retrieved August 23, 2003 , from http://www.tml.hut.fi/Opinnot/Tik-110.551/1996/ahesp.html .
22. IETF. "Secure Shell (secsh)." Retrieved August 23, 2003 , from http://www.ietf.org/html.charters/secsh-charter.html .
23. SSH. "SSH2." Retrieved August 23, 2003 . from http://www.ssh.com/documents/32/ssh2.txt, and Wellington, B. sftp. Retrieved August 23 2003 , from http://www.xbill.org/sftp/oldindex.html .
24. VanDyke Software. "SSH Overview: Security Benefits." Retrieved September 15, 2003, from http://www.vandyke.com/solutions/ssh_overview/ssh_overview_integrity.html .
25. Ibid.
26. IETF. "RFC 2002: IP Mobility Support." Retrieved August 23, 2003 , from http://www.ietf.org/rfc/rfc2002.txt .
27. IEEE. "Status of Project IEEE 802.11f: Recommended Practice for Inter Access Point Protocol." Retrieved August 23, 2003 , from http://grouper.ieee.org/groups/802/11/Reports/tgfupdate.htm .