Return to Article Details Heuristic for Directed Model Checking of Security Protocols Download Download PDF