1. D JI, Y WANG. “Authentication and payment in mobile computing network”. Journal of China institute of communications, 23(2), 2002, p10-16.
2. IEEE P802.11i, Medium Access Control (MAC) Security Enhancements, Amendment 6 to IEEE Standard for Information technology – Telecommunications and information exchange between systems – Local and metropolitan area networks – Specific requirements – Part 11: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications. 2004.
3. H.J. Zhang, L Chen, Y.F. Zhu. “An Efficient Authentication Infrastructure of WLAN Based on Self-Updating Hash Chain”. China Communications, 2007, vol.4, no.1, p 66-74.
4. L Chen, J Liu. H Wang. “Authentication and Key Establishment Scheme based on Token for Mobile Commerce”. The First International Symposium on Data, Privacy, & E-Commerce (ISDPE2007), 2007.
5. L. Lamport. “Password Authentication with Insecure Communication”. Communications of the ACM, 1981, vol.24, no.11, p 770-772.