Constraint differentiation: Search-space reduction for the constraint-based analysis of security protocols