Modeling and solving cryptographic protocol insecurity problem | IEEE Conference Publication | IEEE Xplore