Applying authentication tests to discover Man-In-The-Middle attack in security protocols | IEEE Conference Publication | IEEE Xplore