Human Computing for Handling Strong Corruptions in Authenticated Key Exchange | IEEE Conference Publication | IEEE Xplore