1. IEEE Standard for Information technology– Local and metropolitan area networks– Specific requirements– Part 11: Wireless LAN Medium Access Control (MAC)and Physical Layer (PHY) Specifications Amendment 5: Enhancements for Higher Throughput. IEEE Std 802.11n-2009 (Amendment to IEEE Std 802.11-2007 as amended by IEEE Std 802.11k-2008, IEEE Std 802.11r-2008, IEEE Std 802.11y-2008, and IEEE Std 802.11w-2009) pp. 1–565 (2009).
2. Bennett, C., Bessette, F., Brassard, G., Salvail, L., & Smolin, J. (1992). Experimental quantum cryptography. Journal of Cryptology, 5, 3–28.
3. Bennett, C.H., & Brassard, G. (1984). Quantum cryptography: public key distribution and coin tossing. In Proceedings of the IEEE international conference on computers, systems and signal processing (pp. 175–179). New York: IEEE Press.
4. Canetti, R. (2001). Universally composable security: a new paradigm for cryptographic protocols. In 42nd annual symposium on foundations of computer science, FOCS (pp. 136–145).
5. Carter, J., & Wegman, M.N. (1979). Universal classes of hash functions. Journal of Computer and System Sciences, 18(2), 143–154.