Finitestate analysis of security protocols,” Computer Aided Verification (1998)

by J C Mitchell, V Shmatikov, U Stern