Rule-based assumptions derivation of authentication protocols | IEEE Conference Publication | IEEE Xplore