We model security protocols as a game tree using concepts of game semantics. The model interprets protocol specifications as strategies over a game tree that represents the type of the protocol. The specifications are written in the simple arrow notation commonly used. The model allows us to give formal semantics to this notation. Furthermore, the model can be used for verification of various security properties. Keywords Security protocols, Game semantics, Modeling cryptographic protocols.