[1]
Z. Wang, Z. Huo, e W. Shi, “<b>Security analysis and enhancements of a three-party authenticated key agreement protocol”, Acta Sci. Technol., vol. 37, nº 3, p. 329–336, jul. 2015.