1. [1] “Internet of Things - Lietiskais internets (IoT),” May 2016. [Online]. Available: https://cert.lv/uploads/Ieteikumi/OUCH-201605_lv.pdf [Accessed: January 25, 2017]. (in Latvian).
2. [2] S. Fluhrer, I. Mantin, and A. Shamir, “Weaknesses in the key scheduling algorithm of RC4” Lecture Notes in Computer Science, pp. 1-24, 2001. https://doi.org/10.1007/3-540-45537-x_1
3. [3] Wi-Fi Alliance, “Wi-Fi Protected Access: Strong, standards-based, interoperable security for today’s Wi-Fi networks,” White paper, University of Cape Town, 2003. [Online]. Available: http://www.ansvb.com/Docs/Whitepaper_Wi-Fi_Security4-29-03.pdf [Accessed: May 5, 2017].
4. [4] K. Benton, “The evolution of 802.11 wireless security,” Informatics- Spring, 2010. [Online]. Available: http://homes.soic.indiana.edu/ktbenton/research/benton_wireless.pdf [Accessed: January 25, 2017].
5. [5] J. R. Vacca, Computer and Information Security Handbook. Morgan Kaufmann, 2007, pp. 172-173.