Deakstadieđáhus: Proving security protocols with model checkers by data independence techniques