Modelling Attacker with Deciding Security Properties by Induction and Deduction | IEEE Conference Publication | IEEE Xplore