Security analysis of SKI protocol | IEEE Conference Publication | IEEE Xplore