Specifying and Debugging Security Protocols via Hereditary Harrop Formulas and lambda Prolog - A Case-study