Analysis of Two Authenticated Key Exchange Protocols | IEEE Conference Publication | IEEE Xplore