2Gabriele W, Volker K. Formal Semantics for Authentication Logics[A]. Computer Security-ESORIC 96: LNCS 1146[C]. Berlin: Springer-Verla g, 1996. 215-241.
3IEEE P802.11i D3.0. Specification for Enhanced Security[DB/OL]. http://www.cs.umd.edu/~mhshin/doc/802.11/802.11i-D3.0.pdf, 2002-11-30.
4Canetti R, Krawczyk H. Analysis of Key-exchange Protocol and Thei r Use for Building Secure Channels[A]. Proceeding of Eurocrypt 2001: LNCS 2045[C]. Berlin: Springer-Verlag, 2001. 453-474.
5IEEE P1363: Standard Specifications for Public Key cryptography[D B/OL]. http://grouper.ieee.org/groups/1363, 1999-12-20.
6Diffie W, Oorschot P, Wiener M. Authentication and Authenticated K ey Exchanges[J].Designs, Codes and Cryptography,1992,2(2):107-125.
7IEEE Std 802.11, 1999 Edition[S]. IEEE Standard for Information Technology - Telecommunications and Information Exchange between Systems - Local and Metropolitan Area Network - Specific Requirements - Part 11: Wireless LAN Medium Access Control (MAC) and
8IEEE 802.11i-2004[S]. Amendment to IEEE Std 802.11, 1999 Edition (Reaff 2003). IEEE Standard for Information technology - Telecommunications and information exchange between system - Local and metropolitan area networks?Specific requirements - Part 11: Wi
9HOUSLEY R, POLK W, FORD W, et al. RFC 3280[S]. Internet X.509 Public Key Infrastructure Certificate and CRL Profile. Internet Engineering Task Force, 2002.