Referências

[1]
A. Lashkari, M. Danesh e B. Samadi. A survey on wireless security protocols (WEP, WPA and WPA2/802.11i). International Conference on Computer Science and Information Technology, pages 48-52, 2009.
[2]
A. Lashkari, M. Mansoor e A. Danesh. Wired Equivalent Privacy (WEP) versus Wi-Fi Protected Access (WPA). International Conference on Signal Processing Systems, pages 445-449, 2009.
[3]
A. Linhares e P. Gonçalves. Uma Análise dos Mecanismos de Segurança de Redes IEEE 802.11: WEP, WPA, WPA2 e IEEE 802.11w.
[4]
A. Memon, A. Raza, S. Iqbal. WLAN Security. Master's thesis, 2010.
[5]
A. Stubblefield, J. Ioannidis e A. Rubin. A Key Recovery Attack on the 802.11b Wired Equivalent Privacy Protocol (WEP). ACM Transactions on Information and System Security, pages 319-332, 2004.
[6]
B. Aboba, D. Simon e P. Eronen. [RFC 5247] Extensible Authentication Protocol (EAP) Key Management Framework, 2008.
[7]
B. Aboba, J. Vollbrecht e J. Carlson. [RFC 3748] Extensible Authentication Protocol (EAP), 2004.
[8]
D. Halasz, W. Zorn, S. Norman, D. Smith. [U.S. Patent 6996714] Wireless authentication protocol, 2006.
[9]
D. Stanley, J. Walker e B. Aboba. [RFC 4017] Extensible Authentication Protocol (EAP) Method Requirements for Wireless LANs, 2005.
[10]
G. Lehembre. Wi-Fi security - WEP, WPA and WPA.
[11]
H. Bulbul, I. Batmaz e M. Ozel. Wireless Network Security : Comparison of WEP (Wired Equivalent Privacy) Mechanism, WPA (Wi-Fi Protected Access) and RSN (Robust Security Network) Security Protocols.
[12]
IEEE Standard for Information technology. IEEE Standards: Part 11 Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications - Amendment 6: Medium Access Control (MAC) Security Enhancement, 2004.
[13]
JANET - The UK's Educational and Research Network. Extensible Authentication Protocol (EAP). Factsheet.
[14]
L. Han. A Threat Analysis of The Extensible Authentication Protocol. Technical report, Carleton University, 2006.
[15]
L. Silva. Segurança em Redes sem Fio (Wireless).
[16]
R. Souza e F. Oliveira. O padrão de criptografiaa simétrica AES.
[17]
S. Fluhrer, I. Mantin e A. Shamir. Weaknesses in the Key Scheduling Algorithm of RC4.
[18]
S. Reddy, K. Ramani, K. Rijutha, S. Ali e C. H. Reddy. Wireless hacking-a WiFi hack by cracking WEP. In Proceedings of the 2nd International Conference on Education Technology and Computer (ICETC '10), pages 1189-1193, 2010.
[19]
S. Sotillo. Extensible Authentication Protocol (EAP) Security Issues. 2008.
[20]
W. Stallings. Cryptography and Network Security: Principles and Practice, chapter 17. Prentice Hall Press, 5th edition, 2010.

Anterior | Topo | Próxima