[1]
The LAN/MAN Standards Committee of the IEEE Computer Society. Wireless LAN medium access control and physical layer specification[S]. IEEE std802. 11-(1997).
Google Scholar
[2]
M. Chiba, D. Dommety, M. Eklund, et al. Dynamic Authorization Extensions to Remote Authentication Dial In User Service (RADIUS) [S], Request for Comments: 5176, Network Working Group, (2008).
DOI: 10.17487/rfc5176
Google Scholar
[3]
B. Sterman, D. Sadolevsky, D. Schwartz, et al. "RADIUS Extension for Digest Authentication.
DOI: 10.17487/rfc4590
Google Scholar
[4]
M. J. Sharma, V.C.M. Leung. Improved IP Multimedia Subsystem Authentication mechanism for 3G-WLAN networks[C], 2011 IEEE Conference on Computer Communications Workshops, 2011, p.1000 – 1005.
DOI: 10.1109/infcomw.2011.5928773
Google Scholar
[5]
R. Hyosun, J. Souhwan. Session key exchange and mutual authentication scheme between mobile machines in WLAN based ad hoc networks[C], Conference on Information and Communication Technology Convergence. 2010, p.482 – 483.
DOI: 10.1109/ictc.2010.5674797
Google Scholar
[6]
M. Bellare, P. Rogaway. Optional asymmetric encryption[C], Advances in Cryptology—Proc- eedings of EUROCRYPT, LNCS 950, pp.92-111 . Springer-Verlag, (1994).
DOI: 10.1007/bfb0053428
Google Scholar
[7]
L. Harn, Y. Xu. Design of generalised ElGamal type digital signature schemes based on discrete logarithm[J], IEE Electronics letters, 1994, 30 (24), p.2025 – (2026).
DOI: 10.1049/el:19941398
Google Scholar
[8]
M. Bellare, P. Rogaway. The Exact Security of Digital Signatures—How to Sign with RSA and Rabin[C], Advances in Cryptology—Proceedings of EUROCRYPT, LNCS 1070, p.399 – 416, Springer-Verlag , (1996).
DOI: 10.1007/3-540-68339-9_34
Google Scholar
[9]
The LAN/MAN Standards Committee of the IEEE Computer Society. IEEE Std802. 1X-2001, IEEE Standard for Local and Metropolitan area networks—Prot-Based Network Access Control[S]. IEEE New York, June (2001).
DOI: 10.1109/ieeestd.2004.96095
Google Scholar
[10]
National Password Management Office.SMS4 Cipher Algorithm Using by WLAN products. Information on http: /www. oscca. govcn/Doc/6 /News_1106. htm. (2006).
Google Scholar
[11]
Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms[J], IEEE Trans. Info. Theory, IT-31(4), p.469 – 472, (1985).
DOI: 10.1109/tit.1985.1057074
Google Scholar
[12]
J. Alfred, C. Menezes, C. Paul, et al. Handbook of Applied Cryptography[M], CRC Press: Boca Raton, 1996, p.617 – 619.
Google Scholar
[13]
J. Liu, F. Xie, S. Du, A. Zhao. Security proof of public-key encryption algorithm Rabin-OAEP[J], Computer Engineering, 2009, 35(16), p.115 – 116.
Google Scholar