References


1 Intelligraphics. "Introduction to IEEE 802.11." http://www.intelligraphics.com/articles/80211_article.html. December 2001.

2 Jim Zyren and Al Petrick . "IEEE 802.11 Tutorial." http://www.packetnexus.com/docs/IEEE_80211_Primer.pdf. December 2001.

3 Bob Fleck and Jordan Dimov . "Wireless Access Points and ARP Poisoning." http://www.cigitallabs.com/resources/papers/download/arppoison.pdf. December 2001.

4 Wireless Ethernet Compatibility Alliance. "802.11b Wired Equivalent Privacy (WEP) Security." February 19, 2001. http://www.wi-fi.net/pdf/Wi-FiWEPSecurity.pdf. December 2001.

5 Craig Ellison . "Exploiting and Protecting 802.11b Wireless Networks." ExtremeTech. September 4, 2001. http://www.extremetech.com/print_article/0,3428,a%253D13880,00.asp. December 2001.

6 Scott Fluhrer, Itsik Mantin, and Adi Shamir . "Weaknesses in the Key Scheduling Algorithm of RC4." August 2001.

7 Ronald L. Rivest . "RSA Security Response to Weaknesses in Key Scheduling Algorithm of RC4." http://www.rsasecurity.com/rsalabs/node.asp?id=2009 2001.

8 Joshua Wright . "Weaknesses in LEAP Challenge/Response." http://home.jwu.edu/jwright/presentations/asleap-defcon.pdf. 2003.

9 Wi-Fi Alliance . "Wi-Fi Protected Access: Strong, standards-based, interoperable security for today's Wi-Fi networks" http://www.wi-fi.net/OpenSection/pdf/Whitepaper_Wi-Fi_Security4-29-03.pdf. April 29, 2003.

10 Robert Moskowitz . "Weakness in Passphrase Choice in WPA Interface." http://wifinetnews.com/archives/002452.html. November 4, 2003.

11 AirSnort home page. http://airsnort.sourceforge.net/. December 2001.



    Inside Network Perimeter Security
    Inside Network Perimeter Security (2nd Edition)
    ISBN: 0672327376
    EAN: 2147483647
    Year: 2005
    Pages: 230

    flylib.com © 2008-2017.
    If you may any questions please contact us: flylib@qtcs.net