Text this: Modeling Adversaries in a Logic for Security Protocol Analysis