Wang, Z., Huo, Z., & Shi, W. (2015). <b>Security analysis and enhancements of a three-party authenticated key agreement protocol. Acta Scientiarum. Technology, 37(3), 329–336. https://doi.org/10.4025/actascitechnol.v37i3.25240