Potential weaknesses of AuthA password-authenticated key agreement protocols

Kyung-Ah Shim. Potential weaknesses of AuthA password-authenticated key agreement protocols. Computer Standards & Interfaces, 29(5):580-583, 2007. [doi]

@article{Shim07a,
  title = {Potential weaknesses of AuthA password-authenticated key agreement protocols},
  author = {Kyung-Ah Shim},
  year = {2007},
  doi = {10.1016/j.csi.2007.01.002},
  url = {http://dx.doi.org/10.1016/j.csi.2007.01.002},
  tags = {protocol},
  researchr = {https://researchr.org/publication/Shim07a},
  cites = {0},
  citedby = {0},
  journal = {Computer Standards & Interfaces},
  volume = {29},
  number = {5},
  pages = {580-583},
}