Bibliografia:

 

[1] BENTON, K.; The Evolution of 802.11 Wireless Security, INF 795,2010.

[2] CHEN, J.; JIANG, M.;LIU, Y.; Wireless LAN Security and IEE 802.11i, IEEE Wireless Communications, 2005.

[3] EYDT, B.; FRANKEL, S.; OWENS, L. e SCARFONE, K.; Establishing Wireless Robust Security Networks: A Guide to IEEE 802.11i.

[4] HALASZ, D.; IEEE 802.11i and wireless security. Disponível em: <http://www.eetimes.com/author.asp?section_id=36&doc_id=1287503>. Acesso em: 12 de setembro de 2013.

[5] HE, C. e MITCHELL, J. C.; Security Analysis and Improvements for IEEE 802.11i. Electrical Engineering and Computer Science Departments Stanford University, Stanford CA 94305.

[6] IEEE 802.11i Overview, IEEE Standarts, 2005.

[7] IEEE 802.11i-2004; Amendment 6: Medium Access Control (MAC) Security Enhancements. IEEE Standards, 2004.

[8] ISLAM, C. S. e SOBHAN, A. M.; Security Issues of IEEE-802.11 Wireless Networks. National Conference on Communication and Information Security, NCCIS 2007.

[9] MEHTA, P. C.; Wired Equivalent Privacy Vulnerability, LevelOne Security Essentials Track, April 2001.

[10] MUTHUKKUMARASAMY, V.; POWELL, D. e SITHIRASENAN, E.  IEEE 802.11i WLAN Security Protocol – A Software Engineer’s Model - Griffith University, Queensland, Australia.

[11] VIEIRA, D. L. F. G.; IEE 802.11, UFRJ.