7E Dawson, L Nielsen. Automated cryptanalysis of XOR plaintext strings[J]. Cryptologia, 1996, (2) : 165 - lSl.
8N Borisov, L Goldberg, David Wagner. Intercepting mobile communications:The insecurity of 802.11 [A] .Proc of 7th Annual Int.Conf. Mobile Computing and Networking 2001 Papers [C]. Rome, Italy: ACMCN,2001.
9S Fluhrer, I Mantin, A Shamir. Weaknesses in the key scheduling algorithm of FC4 [A]. Preliminary Draft [C]. Canad.a: CRYPTO,2001.
10ISDN0-7381-2927-5. IEEE. Standard for Local and Metropolitan area networks---Port-Based Network Access Control, IEEE. Std 802.1x-2001 [S].