Protocols for Authentication and Key Establishment door C.A. Boyd, Colin Boyd & North Dartmouth