Review Article

WiFi and WiMAX Secure Deployments

Figure 14

AK derivation with EAP authentication.
423281.fig.0014