1. Mishra, A., Shin, M., Arbaugh, W.A.: Your 802.11 network has no clothes. IEEE Commun. Mag. 9, 44–51 (2002)
2. Beck, M., Tews, E.: Practical attacks against WEP and WPA. In: Procedings of 2nd ACM Conference on Wireless Network Security, WiSec 2009, pp. 79–85 (2009)
3. Mishra, A., Arbaugh, W.A.: An Initial Security Analysis of IEEE 802.1X Standard,
http://www.cs.umd.edu/~waa/1x.pdf
4. Reddy, S.V., Sai Ramani, K., Rijutha, K., Ali, S.M., Reddy, C.P.: Wireless Hacing-A WiFI Hack by Cracking WEP. In: IEEE Second International Conf. on Education Tech. and Computer, vol. 1, p. V1-189 – V1-193 (2010)
5. Lashkari, A.H., Danesh, M.M.S., Samadi, B.: A survey on wireless security protocols (WEP, WPA and WPA2/802.11i). In: 2nd IEEE International Conference on Computer Science and Information Technology, ICCSIT, pp. 48–52 (2009)