Review Article

WiFi and WiMAX Secure Deployments

Figure 16

AK derivation with EAP-EAP authentication.
423281.fig.0016