What Customizing Your Security Protocols Can Do For You