Demonstrating the Necessity of Model Generation in Security Protocol Verification | IEEE Conference Publication | IEEE Xplore