Signal-flow-based analysis of wireless security protocolsÇağatay ÇaparDennis Goeckelet al.2013Information and Computation