Journals
Publish with us
Publishing partnerships
About us
Blog
Journal of Computer Networks and Communications
Journal overview
For authors
For reviewers
For editors
Table of Contents
Special Issues
Journal of Computer Networks and Communications
/
2010
/
Article
/
Fig 14
/
Review Article
WiFi and WiMAX Secure Deployments
Figure 14
AK derivation with EAP authentication.