Journals
Publish with us
Publishing partnerships
About us
Blog
Journal of Computer Networks and Communications
Journal overview
For authors
For reviewers
For editors
Table of Contents
Special Issues
Journal of Computer Networks and Communications
/
2010
/
Article
/
Fig 16
/
Review Article
WiFi and WiMAX Secure Deployments
Figure 16
AK derivation with EAP-EAP authentication.