Cryptographic protocol flaws: know your enemy | IEEE Conference Publication | IEEE Xplore