A game-theoretic model for two-party cryptographic protocols | Publicación