On modelling security protocols for logic-based verification | IET Conference Publication | IEEE Xplore