1. Peisert, S., Talbot, E., & Kroeger, T. (2013). Principles of authentication. In New security paradigms (pp. 47–56). London: ACM.
2. Aldwairi, M., & Aldhanhani, S. (2017). Multi-factor authentication system. In International conference on research and innovation in computer engineering and computer sciences. Malaysia: MTSA.
3. Ajah, I. A. (2014). Evaluation of enhanced security solutions in 802.11-based networks. International Journal of Network Security and Its Applications, 6(4), 29–42.
4. Geier, J. (2008). Implementing 802.1 X security solutions for wired and wireless networks. New York: Wiley.
5. Idrissi, Y. E. H. E., Zahid, N., & Jedra, M. (2011). A new EAP authentication method for IEEE 802.11 wireless. International Journal of Computer Science and Network Security, 11(6), 1–11.