//-->
Detection of spoofed MAC adresses in 802.11 wireless networks
Tao, Kai, (2008)
K2 stream cipher
Kiyomoto, Shinsaku, (2008)
Two types of key-compromise impersonation attacks against one-pass key establishment protocols
Chalkias, K., (2008)