Review Article

WiFi and WiMAX Secure Deployments

Figure 13

AK derivation with RSA authentication.
423281.fig.0013