3CHANG Y-F, CHANG C-C. A secure and efficient strong-password authentication protocol[ J]. ACM SIGOPS Operating Systems Review, 2004, 38(3) :79 -90.
4BICAKCI K, BAYKAL N. Infinite length hash chains and their applications [ J]. Proceedings of the 11th IEEE International Workshops on Enabling Technologies, 2002, (6): 57 -61.
5Hassell J. Radius[M]. America:O'Reilly,2002.
6RFC2865, RFC2866. Remote Authentication Dial In User Service, RADIUS Accounting[ S]. 2000.
7Hill J. An Analysis of the RADIUS Authentication Protocol[EB/OL]. http://www. untruth.org/josh/security/radius/radius- auth. html,2001.
8IEEE Standard Association. Port-Based Network Access Control [EB/OL]. http://standards.ieee.org/reading/ieee/std/lanman/restricted/802.1X-2001.pdf, 2001-6.