Verifying authentication protocols: methodology and example | IEEE Conference Publication | IEEE Xplore