During the past few decades electronic payment protocols has been studied. A lot of electronic payment protocols, for example, 3KP, SET, have been proposed which claimed that have security properties. To our best knowledge, till now analysis of 3KP protocol has not with automatic tool in computational model. Recently owning to the contribution of Meng et al., 3KP protocol can be analyzed with a...