[1]
Wang, Z., Huo, Z. e Shi, W. 2015. <b>Security analysis and enhancements of a three-party authenticated key agreement protocol. Acta Scientiarum. Technology. 37, 3 (jul. 2015), 329–336. DOI:https://doi.org/10.4025/actascitechnol.v37i3.25240.