Analysis models for security protocols door R. Corin