Reasoning about secrecy for active networks | IEEE Conference Publication | IEEE Xplore