2W.A.Arbaugh. An inductive chosen plaintext attck against WEP/WEP2. IEEE Document 802.11-01/230, May, 2000.
3E.Dawson and L.Nielsen. Automated cryptanalysis of XOR plaintext strings. Cryptologia,2:165-181,1996
4S.Singh. The code book: the evolution of secrecy from Mary, Queens of Scots, to quantum cryptography, New York, 1999
5N.Borisov, I.Goldberg, and D.Wagner. Intercepting mobile communications: The insecurity of 802.11. Proceeding of The Seventh Annual International Conference on Mobile Computing and Networking, 180-189,2001
6S.Fluhrer, I.Mantin, and A.Shamir. Weakness in the key scheduling algorithm of RC4. Lecture Notes in Computer Science, Springer Verlag, 2259: 1-12, 2001
7A.Stubblefield, J.Ioannidis, and A.Rubin. Using the Fluhrer,Mantin, and Shamir Attack to Break WEP. ATT Labs Technical Report-TD4ZCPZZ, August, 2001
8J.Daemen, and V.Rijmen. AES Proposal: Rijndal. AES Conference, 1998
9H.Krawczyk, M.Bellare, and R.Canetti. HMAC: Keyed-hashing for message authentication. RFC 2104, Feburary,1997
10W.A.Arbaugh, N.Shankar, and Y.J.Wan. Your wireless network has no clothes, http:/www.cs.umd.edu/-waa/,2001