5Jiange Zhang,Yuanbo Guo,Yue Chen,Jun Ma. AAA Based on802.1xAuthentication[A].重庆环球联合科学技术研究院.Proceedings of 2015 Joint International Mechanical,ElectronicandInformationTechnologyConference(JIMET2015)[C].重庆环球联合科学技术研究院,2015:4..
6Qinggui Hu. The new method to prevent ARP spoofingbasedon802.1Xprotocol[A].重庆环球联合科学技术研究院.Proceedings of 2015 Joint International Mechanical,ElectronicandInformationTechnologyConference(JIMET2015)[C].重庆环球联合科学技术研究院,2015:5..
4Aboba B, Blunk L, Vollbrecht J, et al. Extensible Authentication Proto- col (EAP) [ S]. RFC 3748. 2004 - 06.
5Brown E L. 802.1X Port-Based Authentication [ M ]. Auerbach Publica- tions,2007:42 - 43.
6International Information Technology & Applications Association (IITAA).2011国际信息技术与应用论坛论文集[C].中国广东广州,计算机科学,2011.
7张玉清.网络攻击与防御技术[M].北京:清华大学出版社、2012.
8陈金明.指挥信息系统无线延伸的安全认证问题研究与设计[R].武汉:国防信息学院,2013.
9Ringey C, Willens S, Rubens A. RFC 2865. Remote authentication dial in user service (RADIUS) [ S ]. ISOC ,2000.
10Saber Zrelli, Nobuo Okabe, Yoichi Shinoda, et al. EAP-Kerberos: A Low Latency EAP Authentication Method for Faster Handoffs in Wireless Access Networks[ J]. IEICE transactions on information and systems ,2012,95-D(2) :490 - 502.