Non-Interference Proof Techniques for the Analysis of Cryptographic Protocols