Return to Article Details Directed Model Checking for Security Protocols Download Download PDF