Defending Secret-Key Based Authentication Protocols against the Stolen-Secret Attack | IEEE Conference Publication | IEEE Xplore