2[2]FLUHRER S,MANTIN I,SHAMIR A. Weaknes ses in the key scheduling algorithm of RC4[C]. in:Eighth Annual Workshop on Selected Areas in Cryptography, 2001.
3Weatherspoon S.Overview of IEEE 802.11b Security[J].Intel Technology,2000,Q2:1-5.
4R J Boncella.Wireless Security:An Overview[J].Communication of the Association for Information Systems,2002,9:269-282.
8[2]FLUHRER S,MANTIN I,SHAMIR A. Weaknes ses in the key scheduling algorithm of RC4[C]. in:Eighth Annual Workshop on Selected Areas in Cryptography, 2001.
9Weatherspoon S.Overview of IEEE 802.11b Security[J].Intel Technology,2000,Q2:1-5.
10R J Boncella.Wireless Security:An Overview[J].Communication of the Association for Information Systems,2002,9:269-282.