Authenticity by typing for security protocols | IEEE Conference Publication | IEEE Xplore