Using temporal logic to specify and verify cryptographic protocols | IEEE Conference Publication | IEEE Xplore