The present volume arose from the need for a comprehensive coverage of the state of the art in security protocol analysis. ...