Constraint differentiation: Search-space reduction for the constraint-based analysis of security protocolsSebastian MödersheimLuca Viganòet al.2010Journal of Computer Security