Refining Authenticated Key Agreement with Strong Adversaries | IEEE Conference Publication | IEEE Xplore