The following publications are possibly variants of this publication:
- Cryptanalysis and Enhancements of Three-Party Authenticated Key Exchange Protocol using ECCShuhua Wu, Yuefei Zhu, Qiong Pu. jise, 27(4):1329-1343, 2011. [doi]
- Security Analysis and Enhancements of Verifier-Based Password-Authenticated Key Exchange Protocols in the Three-Party SettingShuhua Wu. jise, 27(3):1059-1072, 2011. [doi]
- Re-attack on a three-party password-based authenticated key exchange protocolHaiquan Liang, Jingtai Hu, Shuhua Wu. mcm, 57(5-6):1175-1183, 2013. [doi]