1. Bellovin, S.M., Merrit, M., 1992. Encrypted key exchanged: password-based protocols secure against dictionary attacks. In: Proceedings of IEEE Symposium on Research in Security and Privacy, pp. 72–84.
2. The KryptoKnight family of light-weight protocols for authentication and key distribution;Bird;IEEE/ACM Transactions on Networking,1995
3. A novel three-party encrypted key exchange protocol;Chang;Computer Standards and Interfaces,2004
4. New directions in cryptography;Diffie;IEEE Transactions on Information Theory,1976
5. Gong, L., 1995. Optimal authentication protocols resistant to password guessing attack. In: Proceedings of the 8th IEEE Computer Security Foundation Workshop, pp. 24–29.