Text this: Formal models and techniques for analyzing security protocols