Return to Article Details Password-based authentication and key distribution protocols with perfect forward secrecy Download Download PDF