Protocols for Authentication and Key Establishment
Colin Boyd
Martin Abadi. Explicit communication revisited: Two new attacks on
authentication protocols. IEEE Transactions on Software Engineering, 23(3):185-
186, March 1997. 2. Martin Abadi. Two facets of authentication. In 11th IEEE
Computer ...