A Comparative Study of Formal Verification Techniques for Authentication Protocols