Counterexample Generation for Ping-Pong Protocols Security Checking Algorithm | IEEE Conference Publication | IEEE Xplore