Research on vulnerability mining of authentication protocol based on fuzzy simulation | IEEE Conference Publication | IEEE Xplore