The author investigates proofs of correctness of realistic security protocols in a formal, intuitive setting. The protocols ...