Discovering Man-in-the-Middle Attacks in Authentication Protocols | IEEE Conference Publication | IEEE Xplore