1. S. Fluhrer, I. Mantin and A. Shamir, Weaknesses in the Key Scheduling Algorithm of RC4. Selected Areas in Cryptography, 8th Annual International Workshop, SAC, Toronto, Ontario, Canada (Springer-Verlag Berlin Heidelberg 2001), pp. 1–24.
2. N. Borisov, I. Goldberg and D. Wagner, Intercepting mobile communications: The insecurity of 802.11. In the proceedings of the Seventh Annual International Conference on Mobile Computing And Networking, ACM New York USA, pp. 16–21 (2001).
3. A. Bittau, M. Handley and J. Lackey, The Final Nail in WEPs Coffin. In the Proceedings of IEEE symposium on security and privacy, pp. 1–15 (2006).
4. E. Tews, R. P. Weinmann and A. Pyshkin, Breaking 104 bit WEP in less than 60 seconds. In the Proceedings of the 8th International Conference on Information Security Applications, Springer Verlag Berlin Heidelberg, pp. 188–202 (2007).
5. L. Ma, A. Y.Teymorian, X. Cheng and M. Song, RAP: Protecting commodity Wi-Fi networks from rogue access points. In the Proceedings of Fourth International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness and Workshops, ACM New York USA, pp. 1–7 (2007).