Weaknesses of a Verifier-Based Password-Authenticated Key Exchange Protocol in the Three-Party Setting | IEEE Conference Publication | IEEE Xplore