A model for secure protocols and their compositions | IEEE Conference Publication | IEEE Xplore