Similar Items: Modeling Adversaries in a Logic for Security Protocol Analysis