Security properties analysis in a TPM–based protocol. (30th April 2014)