Bibliografia

[1] Frankel, S.; Eydt, B.; Owens, L.; Scarfone, K. Establishing Wireless Robust Security Networks: A Guide to IEEE 802.11i. NIST, Gaithersburg, EUA, 2007.

[2] Benton, K. The evolution of 802.11 wireless security. UNLV Informatics, 2010.

[3] IEEE 802.11i-2004: Amendment 6: Medium Access Control (MAC) Security Enhancements. IEEE Standards, 2004.

[4] He, C.; Mitchell, J.C. Analysis of the 802.11i 4-Way Handshake. Proceedings of the 3rd ACM workshop on Wireless Security (WiSe'04). ACM, Nova York, EUA, 2004.

[5] Junaid, M.; Mufti M.; Ilyas M. Vulnerabilities of IEEE 802.11i Wireless LAN CCMP Protocol. World Academy of Science, Engineering and Technology, 2007.

[6] Hellman M. A Cryptanalytic Time-Memory Trade-Off. IEEE Transactions on Information Theory, vol. IT-26, no. 4, 1980.

[7] Jin Hong; Palash Sarkar. Rediscovery of Time Memory Tradeoffs. 2006.

[8] McGrew D. Counter Mode Security: Analysis and Recommendations. Cisco Systems, 2002.

[9] BlueKrypt. Cryptographic Key Length Recommendation. Disponível em: <http://www.keylength.com>. Acesso em: 18 fev. 2013.

[10] Xinyu Xing; Shakshuki, E.; Benoit, D.; Sheltami, T. Security Analysis and Authentication Improvement for IEEE 802.11i Specification. Global Telecommunications Conference, 2008. IEEE GLOBECOM 2008. IEEE, p.1-5, 2008.