Cryptanalysis of a suite of deniable authentication protocols | IEEE Journals & Magazine | IEEE Xplore