[KMGNIST1], "Key Management Guidelines, Part 1: General Guidance", second draft, NIST, June 2002.
[EAPKEYID], Aboba, B., et al. "Extensible Authentication Protocol (EAP) Key Management Framework", IETF work in progress, Internet draft, draft-ietf-eap-keying-03.txt, July 2004.
[IEEE80211i], Institute of Electrical and Electronics Engineers, "Supplement to Standard for Telecommunications and Information Exchange Between Systems – LAN/MAN Specific Requirements – Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Specification for Enhanced Security", IEEE 802.11i, July 2004.
[EDARB80211], Edney, J. and Arbaugh, W., "Real 802.11 Security, Wi-Fi Protected Access and 802.11i", Addison-Wesley, March 2004.
[KERB1510], Kohl, J. and Neuman, C., "The Kerberos Network Authentication Service (V5)", IETF, RFC 1510, September 1993.
[DH2631], Rescorla, E., "Diffie-Hellman Key Agreement Method", IETF, RFC 2631, June 1999.
[IKE2409], Harkins, D. and Carrel, D., "The Internet Key Exchange (IKE)", IETF, RFC 2409, November 1998.
[IKEBORE], Borella, M., "Methods and Protocols for Secure Key Negotiation Using IKE", IEE Network Magazine, July/August 2000.
[PKINIT], Tung, B. et al., "Public Key Cryptography for Initial Authentication in Kerberos", IETF work in progress, draft-ietf-cat-kerberos-pk-init-20.txt, July 2004.
[PACKCABLE], Mihai, B., "Packet Cable Security Architecture", Helsinki University of Technology, November 2000, http://members.fortunecity.com/burli2/packetcable0.html ...