Authentication protocols using encryption techniques | IEEE Conference Publication | IEEE Xplore