Deciding static inclusion for delta-strong and omega [upside down triangle]-strong intruder theories : applications to cryptographic protocol analysis