(1)
Wang, Z.; Huo, Z.; Shi, W. <B>Security Analysis and Enhancements of a Three-Party Authenticated Key Agreement Protocol. Acta Sci. Technol. 2015, 37, 329-336.