[1]
S. Blake-Wilson, N. Bolyard V. Gupta, C. Hawk, B. Moeller, Elliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer Security (TLS). RFC4492, May (2006).
DOI: 10.17487/rfc4492
Google Scholar
[2]
Fluhrer, S, Martion, I and Shamir,A., Weaknesses in the key scheduling algorithm of RC4, Eighth Annual Workshop on Selected Areas in Cryptography, August (2001).
DOI: 10.1007/3-540-45537-x_1
Google Scholar
[3]
Borisov,N., Goldberg,I., and Wagner,D., Intercepting mobile communications; The insecurity of 802. 11, In Proceedings of the Seventh Annual International Conference on Mobile Computing and Networking, (2001).
DOI: 10.1145/381677.381695
Google Scholar
[4]
Liu Ke, Xu Changbiao, Yang Shizhong Authentication Mechanisms in WLAN. Compuer Technology and Development, Jun 2008, pp.164-167.
Google Scholar
[5]
A. Valencia, M. Littlewood, T. Kolar et al. Cisco Layer Two Forwarding (Protocol) L2F,. RFC2341,May (1998).
DOI: 10.17487/rfc2341
Google Scholar
[6]
K. Hamzeh,G. Pall,W. Verthein et al. Point-to-Point Tunneling Protocol. RFC2637, July (1999).
DOI: 10.17487/rfc2637
Google Scholar
[7]
W. Townsley, A. Valencia, A. Rubens, G. Pall, G. Zorn, B. Palter, Layer Two Tunneling Protocol L2TP, RFC 2661, August (1999).
DOI: 10.17487/rfc2661
Google Scholar
[8]
D. Piper, The Internet IP Security Domain of Interpretation for ISAKMP, RFC 2407, November (1998).
DOI: 10.17487/rfc2407
Google Scholar
[9]
E. Rosen,A. Viswanathan,R. Callon. Multiprotocol Label Switching Architecture. RFC3031, January (2001).
DOI: 10.17487/rfc3031
Google Scholar
[10]
Nian Yi, Based on IPSec wireless local area network security technology research, Master Dissertation of Jiangsu University, October (2005).
Google Scholar
[11]
Fang Luping, Liu Shihua, Chen pan. NS-2 network simulation and application [B], National Defense Industry Press, Beijing, (2008).
Google Scholar
[12]
http: /phi. sinica. edu. tw/aspac/reports/94/94011.
Google Scholar
[13]
Liu Fangmin. The results of NS2 network simulation output and analysis. . Computer Engineering, 26 (9), 2002,: p.14 – 16.
Google Scholar