Some remarks on protecting weak keys and poorly-chosen secrets from guessing attacks | IEEE Conference Publication | IEEE Xplore