All protocols are described using BAN logic or the style used by Clark and Jacob, and their goals.
The database includes details on formal proofs or known attacks, with references to comments, analysis & papers.
A large number of protocols are listed, including many which have been shown to be insecure.
It is a continuation of the seminal work by John Clark and Jeremy Jacob.
You can help Wikipedia by expanding it.This computer science article is a stub.