\bibitem{history1}GETVOIP \it{The History of Wi-Fi} [cit. 2020-05-02]. Dostupný z~WWW: \url{https://getvoip.com/history-of-wifi/}
\bibitem{history2}ENCYKLOPÉDIA POZNANIA \it{História Internetu (v rokoch) :)} [cit. 2020-05-02]. Dostupný z~WWW: \url{https://encyklopediapoznania.sk/clanok/449/historia-internetu-v-rokoch}
\bibitem{history3}HOTSPOT REVENUE \it{A Brief History of Public Use/Guest WiFi} [cit. 2020-05-02]. Dostupný z~WWW: \url{http://www.hotspotrevenue.com/wifi/a-brief-history-of-public-useguest-wifi/}
\bibitem{freewifi}SCHECK Steven \it{Why Offering Free WiFi to Your Customers is Wise} [online]. [cit. 2020-04-30]. Dostupný z~WWW: \url{https://smallbiztrends.com/2015/11/small-businesses-need-offer-free-wifi-customers.html}.
\bibitem{802.11}IEEE-SA Standards Board. Wireless LAN MediumAccess Control (MAC) and Physical Layer (PHY)Specifications. Communications Magazine, IEEE, 1999
\bibitem{FMS}FLUHRER S., MANTIN I., SHAMIR A. (2001) \it{Weaknesses in the Key Scheduling Algorithm of RC4.} In Vaudenay S., Youssef A.M. (eds) Selected Areas in Cryptography. SAC 2001. Lecture Notes in Computer Science, vol 2259. Springer, 2001. ISBN: 978-3-540-43066-7.
\bibitem{SIR}STUBBLEFIELD A., Ioannidis J., RUBIN A.D. \it{Using the Fluhrer, Mantin and Shamir Attack to break WEP}
\bibitem{korek2}KoreK. \it{Next generation of WEP attacks?}\url{http://www.netstumbler.org/showpost.php?p=93942&postcount=35}, 2004.
\bibitem{KleinRC4}KLEIN A., \it{Attacks on the RC4 stream cipher.} Designs, Codes and Cryptography, 2008, DOI: 48(3):269–286.
\bibitem{PTW}TEWS Erik, WEINMANN Ralf-Philipp, PYSHKIN Andrei (2007) \it{Breaking 104 bit WEP in less than 60 seconds.} In Sehun Kim, Moti Yung, and HyungWoo Lee, (eds) Information Security Applications, WISA, volume 4867 of Lecture Notes in Computer Science, pages 188–202. Springer, 2007. ISBN: 978-3-540-77534-8.
\bibitem{krack}VANHOEF Mathy, PIESSENS Frank \it{Key Reinstallation Attacks: Forcing Nonce Reuse in {WPA2}} In Proceedings of the 24th ACM Conference on Computer and Communications Security (CCS), ACM, 2017
\bibitem{krackurl}VANHOEF Mathy, PIESSENS Frank \it{Key Reinstallation Attacks