A practical analysis of EAP authentication methods | IEEE Conference Publication | IEEE Xplore