Wang, Z., Huo, Z. e Shi, W. (2015) “<b>Security analysis and enhancements of a three-party authenticated key agreement protocol”, Acta Scientiarum. Technology, 37(3), p. 329–336. doi: 10.4025/actascitechnol.v37i3.25240.