[1] 李兴华, 尚昭辉, 杨丹, 等.利用无线物理层密钥增强802.11i的安全性[J].江苏大学学报(自然科学版), 2013, 34(4):416-421.(LI X H, SHANG Z H, YANG D, et al. Security enhancement of 802.11i by wireless physical layer key[J]. Journal of Jiangsu University (Natural Science Edition), 2013, 34(4):416-421.) [2] 陈卓, 金豪, 张正文.一种无线局域网多安全域间的密钥共识协议[J].计算机应用, 2006, 26(9):2121-2123.(CHEN Z, JING H, ZHANG Z W. Multi-domain key agreement protocol for WLAN[J]. Journal of Computer Applications, 2006, 26(9):2121-2123.) [3] 丰江帆, 王倩, 刘兆宏.无线局域网环境下的图书馆定位系统研究与实现[J].现代图书情报技术, 2012(4):79-83.(FENG J F, WANG Q, LIU Z H. Research and implement of library positioning system in wireless LAN environment[J]. New Technology of Library and Information Service, 2012(4):79-83.) [4] 李勤, 张浩军, 杨峰, 等. 无线局域网安全协议的研究和实现[J]. 计算机应用, 2005, 25(1):160-162.(LIN Q, ZHANG H J, YANG F, et al. Study and implementation of security protocols for wireless local network[J]. Journal of Computer Applications, 2005, 25(1):160-162.) [5] 刘永磊, 金志刚.无线局域网WPS安全性分析[J].计算机工程与应用, 2013, 49(21):87-89.(LIU Y L, JIN Z G. Analysis of WPS security in WLAN[J]. Computer Engineering and Applications, 2013, 49(21):87-89.) [6] 刘安, 金志刚, 王颖.MACH:针对WLAN中WPS认证高速攻击方案[J].计算机应用研究, 2014, 31(8):2488-2496.(LIU A, JIN Z G, WANG Y. MACH:hight-speed cracking scheme to WPS authentication mechanism if WLAN[J]. Application Research of Computers, 2014, 31(8):2488-2496.) [7] 吴国凤, 胡德启, 王培东.RC4算法引起的WEP协议安全性的研究与改进[J].合肥工业大学学报, 2012, 35(5):617-620.(WU G F, HU D Q, WANG P D. Research and improvement in the security of WEP protocol based on RC4 algorithm[J]. Journal of Hefei University of Technology, 2012, 35(5):617-620.) [8] 刘永磊, 金志刚, 陈喆, 等.wpa/wpa2-psk高速暴力破解器的设计和实现[J].计算机工程, 2011, 37(10):125-127.(LIU Y L, JIN Z G, CHEN Z, et al. Design and implementation of high-speed brute forcer for wap/wap2-psk[J]. Computer Engineering, 2011, 37(10):125-127.) [9] 周超, 周城, 郭亮.IEEE 802.1X的安全性分析及改进[J].计算机应用, 2011, 31(5):1265-1270.(ZHOU C, ZHOU C, GUO L. Security analysis and improvement of IEEE 802.1X[J]. Journal of Computer Applications, 2011, 31(5):1265-1270.) [10] 王鹃, 唐西铭, 王勇, 等.一种基于手机令牌和NFC技术的身份认证系统[J].武汉大学学报(理学版), 2013, 59(5):403-410.(WANG J, TANG X M, WANG Y, et al. An identity authentication system based on mobile-token and NFC technology[J]. Journal of Wuhan University (Natural Science Edition), 2013, 59(5):403-410.) [11] 孙权.一种基于NFC的安全非接触式跨行取款系统[J].计算机应用与软件, 2015, 32(8):76-79.(SUN Q. A secure contactless cross-bank ATM withdrawals system based on NFC[J]. Computer Applications and Software, 2015, 32(8):76-79.) [12] ECMA. Near field communication-interface and protocol (NFCIP-1):ECMA 340-2004[S]. 2nd ed.[S. l.]:ECMA, 2004. [13] HASELSTEINER E, BREITFUB K. Security in Near Field Communication (NFC)[EB/OL].[2010-10-10]. http://events.iaik.tugraz.at/RFIDSec06/Program/papers/002%20-%20Security%20in%20NFC.pdf. |