
94
V 2.2 Copyright SystemExperts 2001,2002,2003
187
References (cont.)
n Reference material
n www.cmu.edu/computing/wireless/index.html
n www.teleport.com/~samc/psuwireless/
n www.hpl.hp.com/personal/Jean_Tourrilhes/Linux/
Linux.Wireless.drivers.html
n www.proxim.com/wireless/glossary/index.shtml
n www.motorola.com/SPS/WIRELESS/information/glossary.html
n www.wireless-online.com/glossary.htm
n www.zdnet.com/pcmag/stories/reviews/0,6755,2603595,00.ht
ml
n http://allnetdevices.com/faq/
n www.wapforum.org/
n www.ntia.doc.gov/osmhome/allochrt.html (Frequency Map)
V 2.2 Copyright SystemExperts 2001,2002,2003
188
References (cont.)
n Seminal 802.11 Security Press
n The Isaac project at UC Berkeley
n Integrity checking mechanism, and Use of Initialization Vector (IV)
in RC4 algorithm
n http://www.isaac.cs.berkeley.edu/isaac/wep-faq.html
n Wireless Ethernet Compatibility Alliance (WECA) response to
the UC Berkeley paper
n http://www.wi-fi.net/pdf/Wi-FiWEPSecurity.pdf
n University of Maryland paper “Your 802.11 Wireless Network
has No Clothes”
n Shared Key to derive WEP key, MAC authentication
n http://www.cs.umd.edu/~waa/wireless.pdf
n RC4 Key Scheduling
n http://www.crypto.com/papers/others/rc4_ksaproc.ps
n Using the Fluhrer, Mantin, and Shamir Attack to Break WEP
Comentários a estes Manuais