Is Eve nearby? Analysing protocols under the distant-attacker assumption | Publicación