We present a survey of modern key agreement techniques, and discuss distinguishing characteristics, including identity (entity) authentication, implicit key authentication, key confirmation and key freshness.

authenticated key exchange, authentication, entity authentication, identity, key agreement, key confirmation, security
dx.doi.org/10.1016/0140-3664(94)90100-7
Computer Communications
School of Computer Science

Rueppel, R.A. (Rainer A), & Van Oorschot, P. (1994). Modern key agreement techniques. Computer Communications, 17(7), 458–465. doi:10.1016/0140-3664(94)90100-7