[1] Branch J, Petroni N, van Doorn L, et al.Autonomic 802.11 wireless LAN security auditing [J].IEEE Security and Privacy, 2004, 2(3):56-65.
[2] Johnston D, Walker J.Overview of IEEE 802.16 security [J].IEEE Security and Privacy, 2004, 2(3):40-48.
[3] GB 15629.11—2003 Information technology-local and metropolitan area networks-specific requirements—part 11:wireless LAN medium access control(MAC)and physical layer(PLY)specifications[S].Beijing:Standards Press of China, 2003.(in Chinese)
[4] GB 15629.11—2003/XG1[S].Beijing:Standards Press of China, 2006.(in Chinese)
[5] Canetti R, Krawczyk H.Analysis of key-exchange protocols and their use for building secure channels [C]//Proc of Advances in Cryptology—EUROCRYPT’01, LNCS 2045.Berlin:Springer-Verlag, 2001:453-474.
[6] Canetti R, Krawczyk H.Universally composable notions of key exchange and secure channels [C]//Proc of Advances in Cryptology—EUROCRYPT’02, LNCS 2332.Berlin:Springer-Verlag, 2002:337-351.
[7] Cramer R, Shoup V.A practical public-key cryptosystem provably secure against adaptive chosen ciphertext attack [C]//Proc of Advances in Cryptology — CRYPTO’98, LNCS 1462.Berlin:Springer-Verlag, 1998:13-25.
[8] Mitchell C J, Ward M, Wilson P.Key control in key agreement protocols [J].Electronics Letters, 1998, 34(10):980-981.
[9] Boyd C, Mao W, Paterson K.Key agreement using statically keyed authenticators [C]//Proc of the 2nd International Conference on Applied Cryptography and Network Security, LNCS 3089.Berlin:Springer-Verlag, 2004:248-262.
[10] Bellare M, Canetti R, Krawczyk H.A modular approach to the design and analysis of authentication and key-exchange protocols [C]//Proc of the 30th Annual Symposium on Theory of Computing.New York:ACM Press, 1998:419-428.