1. Xiuying Cao etc. Security System of network, Electronic Industry Press, (2009).
2. Xiaodong Zuo. Analysis of network, Telecommunications Science, (2010).
3. Yinchun Yang. Analysis of WAPI security mechanism [J], Computer Engineering, (2011).
4. (English) Edney, (American) Al Pau writes, Zheng Zhou, etc. Security Practice of network -WPA and 802. 3i, People's Posts and Telecommunications Publishing House, (2010).
5. Haiying Gao, Yuanxing Xue, etc. virtual private network Technologies, China Machine Press, (2012).