Synthesising End-to-End Security Protocols | IEEE Conference Publication | IEEE Xplore