Proofs that yield nothing but their validity and a methodology of cryptographic protocol design | IEEE Conference Publication | IEEE Xplore