From protocol specifications to flaws and attack scenarios: an automatic and formal algorithm | IEEE Conference Publication | IEEE Xplore