Using narrowing in the analysis of key management protocols | IEEE Conference Publication | IEEE Xplore