Validating Attacks on Authentication Protocols | IEEE Conference Publication | IEEE Xplore