A logic for constraint-based security protocol analysis | IEEE Conference Publication | IEEE Xplore