Cryptanalysis of an authentication protocol | IEEE Conference Publication | IEEE Xplore