Analysis of typed analyses of authentication protocols | IEEE Conference Publication | IEEE Xplore