Modeling and verifying security protocols using UML 2 | IEEE Conference Publication | IEEE Xplore