1. Wireless mesh networks: a survey;Akyildiz;Computer Networks,2005
2. Selection of an EAP authentication method for a WLAN;Ali;International Journal of Information and Computer Security,2007
3. Mesh networks: commodity multi-hop ad hoc networks;Bruno;IEEE Communications Magazine,2005
4. Wireless network security: comparison of WEP (wired equivalent privacy) mechanism, WPA (Wi-Fi protected access) and RSN (robust security network) security protocols;Bulbul;Wireless Communications and Mobile Computing Journal,2008
5. Mobility helps peer-to-peer security;Capkun;IEEE Transactions On Mobile Computing,2006