4Jaeseung Go, Kawangjo Kim. Wireless Authentication Protocol Preserving User Anonymity[J]. SCIS 2001, Japan, January 23-26, 2001.
5M.G.Rahman, H.Imai. Security in wireless communication[C]. Wireless Personal Communications, Vol.22, No.2,August, 2002: 213-228.
6M.J.Beller, L.F.Chang, Y.Yacobi. Security for personal communication services: public-key vs. private key approaches[C]. Proceedings of Third International Symposium on Personal, Indoor and Mobile Radio Communication(PIMRC' 92),IEEE Press, NewYork,1992,pp.26-31.
7Northcutt S, Novak J. Network Intrusion Detection: An Analyst' s Handbook. 2nd Edition[C] Indianapolis (IN): New Riders Publishing, 2000.