References
3rd Generation Partnership Project (3GPP) Technical Specification Group Service and System Aspects, 3G Security, Wireless Local Area Network (WLAN) internetworking security (Release 7). 2006. 3GPP TS 33.234.
Aboba, B. & Simon, D. 1999. RFC 2716, PPP EAP TLS Authentication Protocol. The Internet Society.
Aboba, B., Blunk, L., Vollbrecht, J., Carlson, J. & Levkowetz, H. (Ed.) 2004. RFC 3748, Extensible Authentication Protocol (EAP). The Internet Society.
Agni, M., Abdullah, Azween & Low Tan Jung. 2008. Simulation of EAP Method Selection and Negotiation Mechanism. Proceedings of the 3rd International Symposium on Information Technology (ITSIM), 26-29 August. Kuala Lumpur, Malaysia.
Agray, N., Wiebe van der Hoek & Erik de Vink. 2002. On BAN Logic for Industrial Security Protocols. Proceeding of the 2nd International Workshop of Central and Eastern Europe on Multi-Agent Systems (CEEMAS). Berlin, Heidelberg: Springer- Verlag.
Ali, K. M. & Owens, T. J. 2007. Selection of an EAP Authentication Method for a WLAN. Int. J. Information and Computer Security, 1(1/2): pp. 210-233.
Anderson, R. J. 1997. The Formal Verification of a Payment System. Cambridge, UK: Computer Laboratory.
Arkko, J. & Haverinen, H. 2006. RFC 4187, Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA). The Internet Society.
Burrows, M., Abadi, M. & Needham, R. 1990. A Logic of Authentication. ACM Transaction on Computer Systems, 8(1): 18-36
Chiu-Man, Yu. 2002. Secure Execution of Mobile Agents on Open Networks using
Cooperative Agents. Master Thesis, the Chinese University of Hongkong.
Dierks, T. & Allen, C. 1999. RFC 2246, The TLS Protocol Version 1.0. The Internet
Society.
Forsberg, D., Ohba, Y. (Ed.), Patil, B., Tschofenig, H. & Yegin, A. 2007. Protocol for
Carrying Authentication for Network Access (PANA). Internet-Draft. The IETF
Trust.
Funk, P. & Blake-Wilson, S. 2007. EAP Tunneled TLS Authentication Protocol
Version 0 (EAP-TTLSv0). Internet-Draft. The Internet Trust.
Haverinen, H. (Ed.) & Saloway, J., Ed. 2006. RFC 4186, Extensible Authentication
Protocol Method for Global System for Mobile Communications (GSM) Subscriber
Identity Modules (EAP-SIM). The Internet Society.
Horrigan, J. 2007. Wireless Internet Access, December 2006 Tracking Survey.
Princeton Survey Research Associates International for Pew Internet & American
Life Project.
IEEE Standard for Information technology – Telecommunications and information
exchange between systems – Local and metropolitan area networks – Specific
requirements, Part 11, Amendment 6: Medium Access Control (MAC) Security
Enhancements. 2004. IEEE Standard 802.11i.
IEEE Standard for Local and metropolitan area networks, Part 16, Amendment 2:
Physical and Medium Access Control Layers for Combined Fixed and Mobile
Operations in Licensed Bands. 2006. IEEE Standard 802.16e.
IEEE Standard for Local and metropolitan area networks, Port-Based Network
Access Control, 2004. IEEE Standard 802.1X.
Kamath, V., Palekar, A. & Wodrich, M. 2002. Microsoft’s PEAP version 0
(Implementation in Windows XP SP1). Internet-Draft. The Internet Society.
Khan, K. and Akbar, M. 2006. Authentication in Multi-Hop Wireless Mesh Networks.
Transactions on Engineering, Computing and Technology, Vol. 16, November.
World Enformatika Society.
Lee, Jong-Hoon & Park, Ho Jin. 2003. A User Authentication Protocol Using EAP for
Mobile Ad Hoc Networks. Proceedings of the IASTED International Conference:
Communication, Network, and Information Security. New York, USA.
Lou, W. & Fang, Y. 2004. A Survey of Wireless Security in Mobile Ad Hoc
Networks: Challenges and Available Solutions. In Ad Hoc Wireless Networking,
Network Theory and Applications, Vol. 14. Kluwer Academic Publishers.
Microsoft Corp. 2007. IEEE 802.11 Wireless LAN Security with Microsoft Windows,
January. (online). http://www.microsoft.com/downloads/
Moustafa, H., Bourdon, G. & Gourhant, Y. 2005. AAA in Vehicular Communication
on Highways with Ad hoc Networking Support: A Proposed Architecture.
Proceedings of the 2nd ACM International Workshop on Vehicular Ad Hoc
Networks (VANET 2005). Cologne, Germany.
Nidjam, M. & Scholten, H. 2006. Access Point Security Service for wireless ad-hoc
communication. Technical Report TR-CTIT-06-66 Centre for Telematics and
Information Technology. Enschede, Netherlands: University of Twente.
Palekar, A., Simon, D., Salowey, J., Zhou, H., Zorn, G. & Josefsson, S. 2004.
Protected EAP Protocol (PEAP) Version 2. Internet-Draft, The Internet Society.
Paulson, L.C. 1998. Inductive Analysis of the Internet Protocol TLS. Security
Protocols.Berlin, Heidelberg: Springer-Verlag.
Sankar, K., Sundaralingam, S., Miller, D. & Balinsky, A. 2005. Cisco Wireless LAN
Security. N.York: Cisco Press.