Demonstrating the Necessity of Model Generation in Security Protocol Verification | Publicación