1. IEEE Computer Society., & IEEE Standard for Information Technology. (2007). Telecommunications and information exchange between systems—Local and metropolitan area networks—Specific requirements—Part 11: Wireless LAN medium access control (MAC) and physical layer (PHY) specifications, IEEE STD 802.11TM-2007 (revision of IEEE Std 802.11-1999).
2. Wang, Y., Streff, K., & Raman, S. (2012). Smartphone security challenges. Computer, 45(12), 52–58.
3. Tews, E. (2007). Attacks on the WEP protocol. Doctoral dissertation, TU Darmstadt.
4. Yong-lei, L., Zhi-gang, J., & Ying, W. (2010). Survey on security scheme and attacking methods of WPA/WPA2. In IEEE 6th international conference on wireless communication networking and mobile computing (pp. 1–4). Chengdu: IEEE.
5. Fanbao, L., & Tao, X. (2012) How to break EAP-MD5. In Proceedings of the 6th IFIP WG 11.2 international workshop (pp. 49–57). Berlin: Springer.