A model for secure protocols and their compositions | IEEE Journals & Magazine | IEEE Xplore