Design, verification and implementation of an authentication protocol | IEEE Conference Publication | IEEE Xplore