%% You should probably cite rfc4187 instead of this I-D. @techreport{arkko-pppext-eap-aka-16, number = {draft-arkko-pppext-eap-aka-16}, type = {Internet-Draft}, institution = {Internet Engineering Task Force}, publisher = {Internet Engineering Task Force}, note = {Work in Progress}, url = {https://datatracker.ietf.org/doc/draft-arkko-pppext-eap-aka/16/}, author = {Jari Arkko and Henry Haverinen}, title = {{Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA)}}, pagetotal = 79, year = 2004, month = dec, day = 27, abstract = {This document specifies an Extensible Authentication Protocol (EAP) mechanism for authentication and session key distribution that uses the Authentication and Key Agreement (AKA) mechanism. AKA is used in the 3rd generation mobile networks Universal Mobile Telecommunications System (UMTS) and CDMA2000. AKA is based on symmetric keys, and typically runs in a Subscriber Identity Module, which is a UMTS Subscriber Identity Module, USIM, or a (Removable) User Identity Module, (R)UIM, similar to a smart card. EAP-AKA includes optional identity privacy support, optional result indications, and an optional fast re-authentication procedure. This memo provides information for the Internet community.}, }