Safe simplifying transformations for security protocols or not just the Needham Schroeder pubic key protocol | IEEE Conference Publication | IEEE Xplore