A Rewriting Strategy for Protocol Verification (Extended Abstract)