What is the best way to prove a cryptographic protocol correct? | IEEE Conference Publication | IEEE Xplore