Skip to main content
. 2017 Jan 13;17(1):143. doi: 10.3390/s17010143

Figure 3.

Figure 3

Procedures of accessing an encrypted AP. (a) Access procedures; (b) The 4-way handshake.