Return to Article Details Trivializing Verification of Cryptographic Protocols Download Download PDF