1. [1] B. Schneier, Applied Cryptography, Wiley, New York, 1996.
2. [2] A. Freier, P. Karlton, and P. Kocher, The SSL 3.0 protocol, Netscape Communications, 1996.
3. [3] Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, IEEE Computer Society, 1999.
4. [4] W.F. Alliance, “Wi-fi protected access.” http://www.weca.net/opensection/protected_access.asp
5. [5] S. Fluhrer, I. Mantin, and A. Shamir, “Weaknesses in the key scheduling algorithm of RC4,” Proc. SAC2001, LNCS, vol.2259, pp.1-24, Springer-Verlag, 2001.