[1] |
IEEE Supplement to Standard for Information Technology - Telecommunications and Information Exchange Between Systems -LAN/MAN Specific Requirements - Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications:Specification for Enhanced Security[S]. IEEE 802.11i, 2004.
|
[2] |
IEEE Draft Amendment to Standard for Information Technology–Telecommunications and Information Exchange Between Systems -LAN/MAN Specific Requirements - Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications:Amendment to ESS Mesh Networking[S]. IEEE P802.11s/D1.0, 2007.
|
[3] |
Trusted computing group. TCG trusted network connect architecture for interoperability specification version 1.4[EB/OL]. . http://www.trustedcomputinggroup.org/. 2007.
|
[4] |
马卓, 马建峰, 曾勇 等. 通用可组合安全的WLAN Mesh网络可信接入认证协议[J]. 通信学报, 2008,29(11):126-134. MA Z , MA J F , ZHENG Y , et al. Universally composable secure trusted access protocol for WLAN Mesh networks[J]. Journal on Communications, 2008,29(11):126-134.
|
[5] |
MA Z , MA J F , SHEN Y L . Provably secure trusted access protocol for WLAN Mesh networks[A]. 2008 IEEE 5th International Conference on Embedded and Ubiquitous Computing[C]. Shanghai, China, 2008. 43-48.
|
[6] |
MA Z , MA J F , SHEN Y L . An efficient authentication protocol for WLAN Mesh networks in trusted environment[J]. IEICE Transactions on Information and Systems, 2010,E93-D(3):430-437.
|
[7] |
GB 15629.11-2003(信息技术 系统间远程通信和信息交换 局域网和城域网 特定要求 第11部分:无线局域网媒体访问控制和物理层规范)[S]. 中华人民共和国国家标准. 北京:中国标准出版社, 2003.GB 15629.11-2003(Information Technology - Telecommunications and Information Exchange Between Systems-LAN/MAN Specific Re-quirements-Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications)[S]. National Standard of the People's Republic of China. Beijing: Chinese Stan-dard Publishing House, 2003.
|
[8] |
GB 15629.11-2003(信息技术 系统间远程通信和信息交换 局域网和城域网 特定要求 第11部分:无线局域网媒体访问控制和物理层规范)和GB 15629.1102-2003(信息技术 系统间远程通信和信息交换 局域网和城域网 特定要求 第11部分:无线局域网媒体访问控制和物理层规范:2.4 GHz频段较高速物理层扩展规范)实施指南[EB/OL]. 中国宽带无线IP标准工作组. . http://www.chinabwips.org/.Guide for GB 15629.11-2003(information technology-telecommunications and in-formation exchange between systems - LAN/MAN specific require-ments - part 11: wireless LAN medium access control (MAC) and physical layer (PHY) specifications) and GB 15629.1102-2003 (in-formation technology - telecommunications and information exchange between systems - LAN/MAN specific requirements - part 11: wire-less LAN medium access control (MAC) and physical layer (PHY) specifications: higher-speed physical layer extension in the 2.4 GHz band)[EB/OL]. China broadband wireless ip standard group. http://www.chinabwips.org/. .
|
[9] |
GB 15629.11-2003/XG1-2006(信息技术系统间远程通信和信息交换 局域网和城域网 特定要求 第11 部分:无线局域网媒体访问控制和物理层规范,第1号修改单)[S]. 中华人民共和国国家标准. 北京:中国标准出版社, 2006.GB 15629.11-2003/XG1-2006(Information Technology - Telecommunica-tions and Information Exchange Between Systems - LAN/MAN Spe-cific Requirements - Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Amendment 1)[S]. National Standard of the People's Republic of China. Beijing: Chinese Stan-dard Publishing House, 2006.
|
[10] |
IEEE Standard for Information Technology - Telecommunications and Information Exchange Between Systems - LAN/MAN Specific Re-quirements - Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications[S]. IEEE 802.11, 1999.
|
[11] |
TANG Q . On the security of three versions of the WAI protocol in Chinese WLAN implementation plan[A]. CHINACOM'07 Proceedings of the Second International Conference on Communications and Networking in China, 2007 Conference[C]. Shanghai, China, 2007. 333-339.
|
[12] |
铁满霞, 李建东, 王育民 . WAPI密钥管理协议的PCL证明[J]. 电子与信息学报, 2009,31(2): 444-447. TIE M X , LI J D , WANG Y M . A correctness proof of WAPI key management protocol based on PCL[J]. Journal of Electronics&In-formation Technology, 2009,31(2): 444-447.
|
[13] |
FABREGA F J T , HERZOG J C , GUTTMAN J D . Strand spaces:proving security protocols correct[J]. Journal of Computer Security, 1999,7(2/3): 191-230.
|
[14] |
HERZOG J C . The Diffie-Hellman key-agreement scheme in the strand space model[A]. 2003 IEEE 16th IEEE Computer Security Foundations Workshop[C]. Pacific Grove, USA, 2003. 234-247.
|
[15] |
XIAO Y L , WANG Y M , PANG L J . Verification of trusted network access protocols in the strand space model[J]. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2012,E95-A(3): 665-668.
|
[16] |
SAILER R , ZHANG X L , JAEGER T , et al. Design and implementa-tion of a TCG-based integrity measurement architecture[A]. 2004 ACM 13th USENIX Security Symposium[C]. California, USA, 2004. 223-238.
|