Return to Article Details Investigating the method of authenticated key exchange protocol Download Download PDF