1、300K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3W2W2k6h3g2^5M7r3I4G2M7X3g2Q4x3X3g2A6k6h3g2W2i4K6u0W2L8%4u0Y4i4K6u0r3P5s2m8D9i4K6u0r3k6Y4u0W2k6h3q4T1M7#2)9#2k6X3q4D9L8q4)9J5k6h3A6K6M7q4)9K6c8X3q4J5L8Y4g2E0j5X3g2J5i4K6y4p5y4e0b7^5z5e0M7I4y4H3`.`.
Home Wireless Security and Privacy: A Practical Protocol Mixing
以及文章中的参考文献4
... However, Wi-Fi was still vulnerable and in 2008 investigations finally proved the weakness of
the WPA-TKIP protocol by using several attacks not based on dictionary or brute force attack
[4]. This kind of attacks are currently under improvement or development as on 2009, and ...