Revisiting OAKE in the eCK Security Model | IEEE Conference Publication | IEEE Xplore