'Authentication' revisited (correction and addendum to 'Authentication' for distributed systems, Jan. 92, 39-52) | IEEE Journals & Magazine | IEEE Xplore