[1]
J. R. Arana, L. Villa, and O. Polanco, “Implementation of network access control by using authentication, authorization and accounting protocols”, inycomp, vol. 15, no. 1, pp. 127–137, Jun. 2013.