Two-way Handshake protocol for improved security in IEEE 802.11 wireless LANs - ScienceDirect
Vulnerabilities in EAPOL 4-Way Handshake | Part 2 | WPA2 Key Installation KRACK Attacks - YouTube
Technique of the Week: Cracking Wireless Networks | Mariner
4-Way Handshake - WiFi
Taking advantage of the 4-way handshake – Westoahu Cybersecurity
The Beginning of the End of WPA-2 — Cracking WPA-2 Just Got a Whole Lot Easier | by Prof Bill Buchanan OBE | ASecuritySite: When Bob Met Alice | Medium