Verifying Regular Trace Properties of Security Protocols with Explicit Destructors and Implicit Induction