Valid HTML 4.0! Valid CSS!
%%% -*-BibTeX-*-
%%% ====================================================================
%%%  BibTeX-file{
%%%     author          = "Nelson H. F. Beebe",
%%%     version         = "1.90",
%%%     date            = "10 April 2024",
%%%     time            = "08:29:54 MST",
%%%     filename        = "ieeesecpriv.bib",
%%%     address         = "University of Utah
%%%                        Department of Mathematics, 110 LCB
%%%                        155 S 1400 E RM 233
%%%                        Salt Lake City, UT 84112-0090
%%%                        USA",
%%%     telephone       = "+1 801 581 5254",
%%%     FAX             = "+1 801 581 4148",
%%%     URL             = "https://www.math.utah.edu/~beebe",
%%%     checksum        = "51885 57229 215373 2252130",
%%%     email           = "beebe at math.utah.edu, beebe at acm.org,
%%%                        beebe at computer.org (Internet)",
%%%     codetable       = "ISO/ASCII",
%%%     keywords        = "bibliography; BibTeX; IEEE Security &
%%%                        Privacy",
%%%     license         = "public domain",
%%%     supported       = "yes",
%%%     docstring       = "This is a COMPLETE BibTeX bibliography for
%%%                        the bimonthly journal IEEE Security & Privacy
%%%                        (no CODEN, ISSN 1540-7993 (print), 1558-4046
%%%                        (electronic)), covering all journal issues
%%%                        from 2003 -- date.
%%%
%%%                        The journal Web page can be found at:
%%%
%%%                            http://computer.org/security/
%%%                            http://www.computer.org/portal/web/computingnow/securityandprivacy
%%%                            http://www.computer.org/portal/web/csdl/magazines/security
%%%                            https://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=8013
%%%                            https://publications.computer.org/security-and-privacy/
%%%                            https://www.computer.org/csdl/mags/sp/index.html
%%%
%%%                        with back-issue archives at
%%%
%%%                            http://computer.org/security/archives.htm
%%%
%%%                        The journal is also covered by the IEEE
%%%                        Xplore digital library:
%%%
%%%                            http://ieeexplore.ieee.org/servlet/opac?punumber=8013
%%%
%%%                        At version 1.90, the COMPLETE journal
%%%                        coverage looked like this:
%%%
%%%                             2003 (  96)    2011 ( 115)    2019 ( 158)
%%%                             2004 ( 120)    2012 ( 121)    2020 ( 116)
%%%                             2005 ( 103)    2013 ( 122)    2021 ( 165)
%%%                             2006 ( 118)    2014 ( 142)    2022 ( 168)
%%%                             2007 ( 112)    2015 ( 142)    2023 ( 137)
%%%                             2008 ( 117)    2016 ( 133)    2024 (  52)
%%%                             2009 ( 120)    2017 ( 148)
%%%                             2010 ( 116)    2018 ( 129)
%%%
%%%                             Article:       2748
%%%                             Book:             2
%%%
%%%                             Total entries: 2750
%%%
%%%                        The initial draft was extracted from the
%%%                        journal Web site.
%%%
%%%                        URL keys in the bibliography point to
%%%                        World Wide Web locations of additional
%%%                        information about the entry.
%%%
%%%                        Spelling has been verified with the UNIX
%%%                        spell and GNU ispell programs using the
%%%                        exception dictionary stored in the companion
%%%                        file with extension .sok.
%%%
%%%                        BibTeX citation tags are uniformly chosen
%%%                        as name:year:abbrev, where name is the
%%%                        family name of the first author or editor,
%%%                        year is a 4-digit number, and abbrev is a
%%%                        3-letter condensation of important title
%%%                        words. Citation tags were automatically
%%%                        generated by software developed for the
%%%                        BibNet Project.
%%%
%%%                        In this bibliography, entries are sorted in
%%%                        publication order, using ``bibsort -byvolume.''
%%%
%%%                        The checksum field above contains a CRC-16
%%%                        checksum as the first value, followed by the
%%%                        equivalent of the standard UNIX wc (word
%%%                        count) utility output of lines, words, and
%%%                        characters.  This is produced by Robert
%%%                        Solovay's checksum utility.",
%%%  }
%%% ====================================================================
@Preamble{
    "\ifx \undefined \booktitle \def \booktitle#1{{{\em #1}}}      \fi" #
    "\ifx \undefined \circled   \def \circled #1{(#1)}             \fi" #
    "\ifx \undefined \ocirc     \def \ocirc     #1{{\accent'27#1}} \fi" #
    "\ifx \undefined \reg       \def \reg {\circled{R}}            \fi" #
    "\ifx \undefined \r         \let \r = \ocirc  \fi"
}

%%% ====================================================================
%%% Acknowledgement abbreviations:
@String{ack-nhfb = "Nelson H. F. Beebe,
                    University of Utah,
                    Department of Mathematics, 110 LCB,
                    155 S 1400 E RM 233,
                    Salt Lake City, UT 84112-0090, USA,
                    Tel: +1 801 581 5254,
                    FAX: +1 801 581 4148,
                    e-mail: \path|beebe@math.utah.edu|,
                            \path|beebe@acm.org|,
                            \path|beebe@computer.org| (Internet),
                    URL: \path|https://www.math.utah.edu/~beebe/|"}

%%% ====================================================================
%%% Journal abbreviations:
@String{j-IEEE-SEC-PRIV = "IEEE Security \& Privacy"}

%%% ====================================================================
%%% Publisher abbreviations:
@String{pub-PEARSON-EDUCATION   = "Pearson Education"}
@String{pub-PEARSON-EDUCATION:adr = "Upper Saddle River, NJ, USA"}

@String{pub-PHPTR               = "Pren{\-}tice-Hall PTR"}
@String{pub-PHPTR:adr           = "Upper Saddle River, NJ 07458, USA"}

%%% ====================================================================
%%% Bibliography entries:
@Article{Cybenko:2003:CNA,
  author =       "George Cybenko",
  title =        "A Critical Need, An Ambitious Mission, a New
                 Magazine",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "1",
  number =       "1",
  pages =        "5--9",
  month =        jan # "\slash " # feb,
  year =         "2003",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 3 18:46:48 MST 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/security/j1005.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Miller:2003:LBL,
  author =       "Sandra Kay Miller",
  title =        "Legal Battle Looming for {Internet} Protections Acts",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "1",
  number =       "1",
  pages =        "10--12",
  month =        jan # "\slash " # feb,
  year =         "2003",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 3 18:46:48 MST 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://dlib.computer.org/sp/books/sp2003/pdf/j1010.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Andresen:2003:NDS,
  author =       "Scott L. Andresen",
  title =        "New Draft to Secure Cyberspace Leaked",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "1",
  number =       "1",
  pages =        "13--13",
  month =        jan # "\slash " # feb,
  year =         "2003",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 3 18:46:48 MST 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://dlib.computer.org/sp/books/sp2003/pdf/j1013.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Garfinkel:2003:RDP,
  author =       "Simson L. Garfinkel and Abhi Shelat",
  title =        "Remembrance of Data Passed: a Study of Disk
                 Sanitization Practices",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "1",
  number =       "1",
  pages =        "17--27",
  month =        jan # "\slash " # feb,
  year =         "2003",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2003.1176992",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 3 18:46:48 MST 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://dlib.computer.org/sp/books/sp2003/pdf/j1017.pdf;
                 http://www.computer.org/security/j1017abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Petroni:2003:DMS,
  author =       "Nick L. {Petroni, Jr.} and William A. Arbaugh",
  title =        "The Dangers of Mitigating Security Design Flaws: a
                 Wireless Case Study",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "1",
  number =       "1",
  pages =        "28--36",
  month =        jan # "\slash " # feb,
  year =         "2003",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2003.1176993",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 3 18:46:48 MST 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://dlib.computer.org/sp/books/sp2003/pdf/j1028.pdf;
                 http://www.computer.org/security/j1028abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Cowan:2003:SSO,
  author =       "Crispin Cowan",
  title =        "Software Security for Open-Source Systems",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "1",
  number =       "1",
  pages =        "38--45",
  month =        jan # "\slash " # feb,
  year =         "2003",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2003.1176994",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 3 18:46:48 MST 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://dlib.computer.org/sp/books/sp2003/pdf/j1038.pdf;
                 http://www.computer.org/security/j1038abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Haines:2003:VSA,
  author =       "Joshua Haines and Dorene Kewley Ryder and Laura Tinnel
                 and Stephen Taylor",
  title =        "Validation of Sensor Alert Correlators",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "1",
  number =       "1",
  pages =        "46--56",
  month =        jan # "\slash " # feb,
  year =         "2003",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2003.1176995",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 3 18:46:48 MST 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://dlib.computer.org/sp/books/sp2003/pdf/j1046.pdf;
                 http://www.computer.org/security/j1046abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Howard:2003:IWS,
  author =       "Michael Howard and Steve Lipner",
  title =        "Inside the {Windows} Security Push",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "1",
  number =       "1",
  pages =        "57--61",
  month =        jan # "\slash " # feb,
  year =         "2003",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2003.1176996",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 3 18:46:48 MST 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://dlib.computer.org/sp/books/sp2003/pdf/j1057.pdf;
                 http://www.computer.org/security/j1057abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Donner:2003:ABM,
  author =       "Marc Donner",
  title =        "{AI} Bites Man?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "1",
  number =       "1",
  pages =        "63--66",
  month =        jan # "\slash " # feb,
  year =         "2003",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2003.1176997",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 3 18:46:48 MST 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://dlib.computer.org/sp/books/sp2003/pdf/j1063.pdf;
                 http://www.computer.org/security/j1063abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Bishop:2003:WCS,
  author =       "Matt Bishop",
  title =        "What Is Computer Security?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "1",
  number =       "1",
  pages =        "67--69",
  month =        jan # "\slash " # feb,
  year =         "2003",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2003.1176998",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 3 18:46:48 MST 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://dlib.computer.org/sp/books/sp2003/pdf/j1067.pdf;
                 http://www.computer.org/security/j1067abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Ryan:2003:TVS,
  author =       "Daniel J. Ryan",
  title =        "Two Views on Security Software Liability: Let the
                 Legal System Decide",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "1",
  number =       "1",
  pages =        "70--72",
  month =        jan # "\slash " # feb,
  year =         "2003",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 3 18:46:48 MST 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://dlib.computer.org/sp/books/sp2003/pdf/j1070.pdf;
                 http://www.computer.org/security/j1070abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Heckman:2003:TVS,
  author =       "Carey Heckman",
  title =        "Two Views on Security Software Liability: Using the
                 Right Legal Tools",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "1",
  number =       "1",
  pages =        "73--75",
  month =        jan # "\slash " # feb,
  year =         "2003",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 3 18:46:48 MST 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://dlib.computer.org/sp/books/sp2003/pdf/j1073.pdf;
                 http://www.computer.org/security/j1073abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Lesk:2003:CEE,
  author =       "Michael Lesk",
  title =        "Copyright Extension: {Eldred} v. {Ashcroft}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "1",
  number =       "1",
  pages =        "76--78",
  month =        jan # "\slash " # feb,
  year =         "2003",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2003.1177000",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 3 18:46:48 MST 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://dlib.computer.org/sp/books/sp2003/pdf/j1076.pdf;
                 http://www.computer.org/security/j1076abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Hearn:2003:IPC,
  author =       "Jim Hearn",
  title =        "International Participation: The Continuing March
                 Toward Security and Privacy",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "1",
  number =       "1",
  pages =        "79--81",
  month =        jan # "\slash " # feb,
  year =         "2003",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2003.1177001",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 3 18:46:48 MST 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://dlib.computer.org/sp/books/sp2003/pdf/j1079.pdf;
                 http://www.computer.org/security/j1079abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Arce:2003:ASW,
  author =       "Iv{\'a}n Arce and Elias Levy",
  title =        "An Analysis of the {Slapper Worm}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "1",
  number =       "1",
  pages =        "82--87",
  month =        jan # "\slash " # feb,
  year =         "2003",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2003.1177002",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 3 18:46:48 MST 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://dlib.computer.org/sp/books/sp2003/pdf/j1082.pdf;
                 http://www.computer.org/security/j1082abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Smith:2003:FDS,
  author =       "S. W. Smith",
  title =        "Fairy Dust, Secrets, and the Real World",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "1",
  number =       "1",
  pages =        "89--93",
  month =        jan # "\slash " # feb,
  year =         "2003",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2003.1177003",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 3 18:46:48 MST 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://dlib.computer.org/sp/books/sp2003/pdf/j1089.pdf;
                 http://www.computer.org/security/j1089abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Stytz:2003:SPS,
  author =       "Martin R. Stytz and James A. Whittaker",
  title =        "Software Protection: Security's Last Stand?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "1",
  number =       "1",
  pages =        "95--98",
  month =        jan # "\slash " # feb,
  year =         "2003",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2003.1177004",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 3 18:46:48 MST 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://dlib.computer.org/sp/books/sp2003/pdf/j1095.pdf;
                 http://www.computer.org/security/j1095abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Caloyannides:2003:PVI,
  author =       "Michael Caloyannides",
  title =        "Privacy vs. Information Technology",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "1",
  number =       "1",
  pages =        "100--103",
  month =        jan # "\slash " # feb,
  year =         "2003",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2003.1177005",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 3 18:46:48 MST 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://dlib.computer.org/sp/books/sp2003/pdf/j1100.pdf;
                 http://www.computer.org/security/j1100abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Schneier:2003:WAS,
  author =       "Bruce Schneier",
  title =        "We Are All Security Consumers",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "1",
  number =       "1",
  pages =        "104--104",
  month =        jan # "\slash " # feb,
  year =         "2003",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 3 18:46:48 MST 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://dlib.computer.org/sp/books/sp2003/pdf/j1104.pdf;
                 http://www.computer.org/security/j1104abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Cybenko:2003:ESS,
  author =       "George Cybenko",
  title =        "From the {Editor}: {Sapphire\slash Slammer} Redux",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "1",
  number =       "2",
  pages =        "6--6",
  month =        mar # "\slash " # apr,
  year =         "2003",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 3 19:00:16 MST 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://dlib.computer.org/sp/books/sp2003/pdf/j2006.pdf;
                 http://www.computer.org/security/j2006abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2003:LEa,
  author =       "Anonymous",
  title =        "Letters to the {Editor}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "1",
  number =       "2",
  pages =        "7--10",
  month =        mar # "\slash " # apr,
  year =         "2003",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 3 19:00:16 MST 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  note =         "See erratum \cite{Anonymous:2003:EHV}.",
  URL =          "http://dlib.computer.org/sp/books/sp2003/pdf/j2007.pdf;
                 http://www.computer.org/security/j2007abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Dern:2003:PC,
  author =       "Daniel P. Dern",
  title =        "Privacy Concerns",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "1",
  number =       "2",
  pages =        "11--13",
  month =        mar # "\slash " # apr,
  year =         "2003",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 3 19:00:16 MST 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://dlib.computer.org/sp/books/sp2003/pdf/j2011.pdf;
                 http://www.computer.org/security/j2011abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Spitzner:2003:HPT,
  author =       "Lance Spitzner",
  title =        "The {Honeynet Project}: Trapping the Hackers",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "1",
  number =       "2",
  pages =        "15--23",
  month =        mar # "\slash " # apr,
  year =         "2003",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2003.1193207",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 3 19:00:16 MST 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://dlib.computer.org/sp/books/sp2003/pdf/j2015.pdf;
                 http://www.computer.org/security/j2015abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Blaze:2003:RAM,
  author =       "Matt Blaze",
  title =        "Rights Amplification in Master-Keyed Mechanical
                 Locks",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "1",
  number =       "2",
  pages =        "24--32",
  month =        mar # "\slash " # apr,
  year =         "2003",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2003.1193208",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 3 19:00:16 MST 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://dlib.computer.org/sp/books/sp2003/pdf/j2024.pdf;
                 http://www.computer.org/security/j2024abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Prabhakar:2003:BRS,
  author =       "Salil Prabhakar and Sharath Pankanti and Anil K.
                 Jain",
  title =        "Biometric Recognition: Security and Privacy Concerns",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "1",
  number =       "2",
  pages =        "33--42",
  month =        mar # "\slash " # apr,
  year =         "2003",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2003.1193209",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 3 19:00:16 MST 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://dlib.computer.org/sp/books/sp2003/pdf/j2033.pdf;
                 http://www.computer.org/security/j2033abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Burr:2003:SAE,
  author =       "William E. Burr",
  title =        "Selecting the {Advanced Encryption Standard}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "1",
  number =       "2",
  pages =        "43--52",
  month =        mar # "\slash " # apr,
  year =         "2003",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2003.1193210",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 3 19:00:16 MST 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://dlib.computer.org/sp/books/sp2003/pdf/j2043.pdf;
                 http://www.computer.org/security/j2043abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Donner:2003:PAN,
  author =       "Marc Donner",
  title =        "Post-Apocalypse Now",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "1",
  number =       "2",
  pages =        "53--55",
  month =        mar # "\slash " # apr,
  year =         "2003",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 3 19:00:16 MST 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://dlib.computer.org/sp/books/sp2003/pdf/j2053.pdf;
                 http://www.computer.org/security/j2053abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Davis:2003:TSD,
  author =       "Jim Davis and Melissa Dark",
  title =        "Teaching Students to Design Secure Systems",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "1",
  number =       "2",
  pages =        "56--58",
  month =        mar # "\slash " # apr,
  year =         "2003",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2003.1193212",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 3 19:00:16 MST 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://dlib.computer.org/sp/books/sp2003/pdf/j2056.pdf;
                 http://www.computer.org/security/j2056abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{McGraw:2003:GDS,
  author =       "Gary McGraw",
  title =        "From the Ground Up: The {DIMACS Software Security
                 Workshop}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "1",
  number =       "2",
  pages =        "59--66",
  month =        mar # "\slash " # apr,
  year =         "2003",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2003.1193213",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 3 19:00:16 MST 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  note =         "See erratum \cite{Anonymous:2003:EHV}.",
  URL =          "http://dlib.computer.org/sp/books/sp2003/pdf/j2059.pdf;
                 http://www.computer.org/security/j2059abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Lesk:2003:CEC,
  author =       "Michael Lesk",
  title =        "Copyright Enforcement or Censorship: New Uses for the
                 {DMCA}?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "1",
  number =       "2",
  pages =        "67--69",
  month =        mar # "\slash " # apr,
  year =         "2003",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2003.1193214",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 3 19:00:16 MST 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://dlib.computer.org/sp/books/sp2003/pdf/j2067.pdf;
                 http://www.computer.org/security/j2067abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Hearn:2003:MF,
  author =       "Jim Hearn",
  title =        "Moving Forward?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "1",
  number =       "2",
  pages =        "70--71",
  month =        mar # "\slash " # apr,
  year =         "2003",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2003.1193215",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 3 19:00:16 MST 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://dlib.computer.org/sp/books/sp2003/pdf/j2070.pdf;
                 http://www.computer.org/security/j2070abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Arce:2003:WLR,
  author =       "Iv{\'a}n Arce",
  title =        "The Weakest Link Revisited",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "1",
  number =       "2",
  pages =        "72--76",
  month =        mar # "\slash " # apr,
  year =         "2003",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2003.1193216",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 3 19:00:16 MST 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://dlib.computer.org/sp/books/sp2003/pdf/j2072.pdf;
                 http://www.computer.org/security/j2072abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Ball:2003:PPE,
  author =       "Edward Ball and David W. Chadwick and Darren Mundy",
  title =        "Patient Privacy in Electronic Prescription Transfer",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "1",
  number =       "2",
  pages =        "77--80",
  month =        mar # "\slash " # apr,
  year =         "2003",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2003.1193217",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 3 19:00:16 MST 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://dlib.computer.org/sp/books/sp2003/pdf/j2077.pdf;
                 http://www.computer.org/security/j2077abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Whittaker:2003:WSA,
  author =       "James Whittaker",
  title =        "Why Secure Applications Are Difficult to Write",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "1",
  number =       "2",
  pages =        "81--83",
  month =        mar # "\slash " # apr,
  year =         "2003",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2003.1193218",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 3 19:00:16 MST 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://dlib.computer.org/sp/books/sp2003/pdf/j2081.pdf;
                 http://www.computer.org/security/j2081abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Caloyannides:2003:ESC,
  author =       "Michael A. Caloyannides",
  title =        "Engineering or Sloganeering? The Counterattack on
                 Privacy",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "1",
  number =       "2",
  pages =        "84--87",
  month =        mar # "\slash " # apr,
  year =         "2003",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 3 19:00:16 MST 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://dlib.computer.org/sp/books/sp2003/pdf/j2084.pdf;
                 http://www.computer.org/security/j2084abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Schneier:2003:LFD,
  author =       "Bruce Schneier",
  title =        "Locks and Full Disclosure",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "1",
  number =       "2",
  pages =        "88--88",
  month =        mar # "\slash " # apr,
  year =         "2003",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 3 19:00:16 MST 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://dlib.computer.org/sp/books/sp2003/pdf/j2088.pdf;
                 http://www.computer.org/security/j2088abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Donner:2003:TSO,
  author =       "Marc Donner",
  title =        "Toward a Security Ontology",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "1",
  number =       "3",
  pages =        "6--7",
  month =        may # "\slash " # jun,
  year =         "2003",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Jun 14 14:56:19 MDT 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://dlib.computer.org/sp/books/sp2003/pdf/j3006.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2003:EHV,
  author =       "Anonymous",
  title =        "Errata: {``On the Horizon'' (vol. 1, no. 2)} and
                 {``Interface'' (vol. 1, no. 2, p. 9)}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "1",
  number =       "3",
  pages =        "7--7",
  month =        may # "\slash " # jun,
  year =         "2003",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Jun 14 14:56:19 MDT 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  note =         "See \cite{McGraw:2003:GDS,Anonymous:2003:LEa}.",
  URL =          "http://dlib.computer.org/sp/books/sp2003/pdf/j3008.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2003:N,
  author =       "Anonymous",
  title =        "News",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "1",
  number =       "3",
  pages =        "8--13",
  month =        may # "\slash " # jun,
  year =         "2003",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Jun 14 14:56:19 MDT 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://dlib.computer.org/sp/books/sp2003/pdf/j3008.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Mead:2003:BF,
  author =       "Nancy R. Mead",
  title =        "Building a Foundation",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "1",
  number =       "3",
  pages =        "14--14",
  month =        may # "\slash " # jun,
  year =         "2003",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Jun 14 14:56:19 MDT 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://dlib.computer.org/sp/books/sp2003/pdf/j3014.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Ishitani:2003:MBA,
  author =       "Lucila Ishitani and Virgilio Almeida and Wagner
                 {Meira, Jr.}",
  title =        "Masks: Bringing Anonymity and Personalization
                 Together",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "1",
  number =       "3",
  pages =        "18--23",
  month =        may # "\slash " # jun,
  year =         "2003",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2003.1203218",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Jun 14 14:56:19 MDT 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://dlib.computer.org/sp/books/sp2003/pdf/j3018.pdf;
                 http://www.computer.org/security/j3018abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Aljifri:2003:ITN,
  author =       "Hassan Aljifri",
  title =        "{IP} Traceback: a New Denial-of-Service Deterrent?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "1",
  number =       "3",
  pages =        "24--31",
  month =        may # "\slash " # jun,
  year =         "2003",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2003.1203219",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Jun 14 14:56:19 MDT 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://dlib.computer.org/sp/books/sp2003/pdf/j3024.pdf;
                 http://www.computer.org/security/j3024abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Provos:2003:HSI,
  author =       "Niels Provos and Peter Honeyman",
  title =        "Hide and Seek: An Introduction to Steganography",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "1",
  number =       "3",
  pages =        "32--44",
  month =        may # "\slash " # jun,
  year =         "2003",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2003.1203220",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Jun 14 14:56:19 MDT 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://dlib.computer.org/sp/books/sp2003/pdf/j3032.pdf;
                 http://www.computer.org/security/j3032abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Matyas:2003:TRU,
  author =       "V{\'a}clav {Maty{\'a}s, Jr.} and Zdenek Riha",
  title =        "Toward Reliable User Authentication through
                 Biometrics",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "1",
  number =       "3",
  pages =        "45--49",
  month =        may # "\slash " # jun,
  year =         "2003",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2003.1203221",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Jun 14 14:56:19 MDT 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://dlib.computer.org/sp/books/sp2003/pdf/j3045.pdf;
                 http://www.computer.org/security/j3045abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Donner:2003:HR,
  author =       "Marc Donner",
  title =        "Hey, Robot!",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "1",
  number =       "3",
  pages =        "51--55",
  month =        may # "\slash " # jun,
  year =         "2003",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Jun 14 14:56:19 MDT 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://dlib.computer.org/sp/books/sp2003/pdf/j3051.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Frincke:2003:WWS,
  author =       "Deborah Frincke",
  title =        "Who Watches the Security Educators?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "1",
  number =       "3",
  pages =        "56--58",
  month =        may # "\slash " # jun,
  year =         "2003",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2003.1203223",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Jun 14 14:56:19 MDT 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://dlib.computer.org/sp/books/sp2003/pdf/j3056.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Felten:2003:UTC,
  author =       "Edward W. Felten",
  title =        "Understanding Trusted Computing: Will Its Benefits
                 Outweigh Its Drawbacks?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "1",
  number =       "3",
  pages =        "60--62",
  month =        may # "\slash " # jun,
  year =         "2003",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2003.1203224",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Jun 14 14:56:19 MDT 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://dlib.computer.org/sp/books/sp2003/pdf/j3060.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Lesk:2003:GBU,
  author =       "Michael Lesk",
  title =        "The Good, the Bad, and the Ugly: What Might Change if
                 We Had Good {DRM}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "1",
  number =       "3",
  pages =        "63--66",
  month =        may # "\slash " # jun,
  year =         "2003",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2003.1203225",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Jun 14 14:56:19 MDT 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://dlib.computer.org/sp/books/sp2003/pdf/j3063.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Hearn:2003:SD,
  author =       "Jim Hearn",
  title =        "Slow Dancing",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "1",
  number =       "3",
  pages =        "67--68",
  month =        may # "\slash " # jun,
  year =         "2003",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2003.1203226",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Jun 14 14:56:19 MDT 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://dlib.computer.org/sp/books/sp2003/pdf/j3067.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Levy:2003:PSS,
  author =       "Elias Levy",
  title =        "Poisoning the Software Supply Chain",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "1",
  number =       "3",
  pages =        "70--73",
  month =        may # "\slash " # jun,
  year =         "2003",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2003.1203227",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Jun 14 14:56:19 MDT 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://dlib.computer.org/sp/books/sp2003/pdf/j3070.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Smith:2003:HLH,
  author =       "S. W. Smith",
  title =        "Humans in the Loop: Human-Computer Interaction and
                 Security",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "1",
  number =       "3",
  pages =        "75--79",
  month =        may # "\slash " # jun,
  year =         "2003",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2003.1203228",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Jun 14 14:56:19 MDT 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://dlib.computer.org/sp/books/sp2003/pdf/j3075.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Stytz:2003:CSW,
  author =       "Martin R. Stytz",
  title =        "The Case for Software Warranties",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "1",
  number =       "3",
  pages =        "80--82",
  month =        may # "\slash " # jun,
  year =         "2003",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Jun 14 14:56:19 MDT 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://dlib.computer.org/sp/books/sp2003/pdf/j3080.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Caloyannides:2003:SCF,
  author =       "Michael A. Caloyannides",
  title =        "Society Cannot Function Without Privacy",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "1",
  number =       "3",
  pages =        "84--86",
  month =        may # "\slash " # jun,
  year =         "2003",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Jun 14 14:56:19 MDT 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://dlib.computer.org/sp/books/sp2003/pdf/j3084.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Schneier:2003:GUP,
  author =       "Bruce Schneier",
  title =        "Guilty Until Proven Innocent?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "1",
  number =       "3",
  pages =        "88, 87",
  month =        may # "\slash " # jun,
  year =         "2003",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Jun 14 14:56:19 MDT 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://dlib.computer.org/sp/books/sp2003/pdf/j3088.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Landwehr:2003:ESC,
  author =       "Carl E. Landwehr",
  title =        "From the {Editor}: Security Cosmology: Moving from
                 {Big Bang} to Worlds in Collusion",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "1",
  number =       "5",
  pages =        "5--5",
  month =        sep # "\slash " # oct,
  year =         "2003",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Oct 9 07:39:10 MDT 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2003/05/j5005.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2003:SPW,
  author =       "Anonymous",
  title =        "{Security and Privacy} Welcomes New {Editorial Board}
                 Members",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "1",
  number =       "5",
  pages =        "6--7",
  month =        sep # "\slash " # oct,
  year =         "2003",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Oct 9 07:39:10 MDT 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2003/05/j5006.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Goth:2003:Na,
  author =       "Greg Goth and Sandra Kay Miller",
  title =        "News",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "1",
  number =       "5",
  pages =        "8--11",
  month =        sep # "\slash " # oct,
  year =         "2003",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Oct 9 07:39:10 MDT 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2003/05/j5008.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Andresen:2003:NB,
  author =       "Scott L. Andresen",
  title =        "News Briefs",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "1",
  number =       "5",
  pages =        "12--13",
  month =        sep # "\slash " # oct,
  year =         "2003",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Oct 9 07:39:10 MDT 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2003/05/j5012.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2003:LEb,
  author =       "Anonymous",
  title =        "Letters to the Editor",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "1",
  number =       "5",
  pages =        "14--14",
  month =        sep # "\slash " # oct,
  year =         "2003",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Oct 9 07:39:10 MDT 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2003/05/j5014.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Campbell:2003:CSI,
  author =       "Robert J. Campbell",
  title =        "Crime Scene Investigators: The Next Generation",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "1",
  number =       "5",
  pages =        "15--15",
  month =        sep # "\slash " # oct,
  year =         "2003",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Oct 9 07:39:10 MDT 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2003/05/j5015.pdf;
                 http://csdl.computer.org/comp/mags/sp/2003/05/j5015abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{McGrath:2003:MEP,
  author =       "Dennis McGrath",
  title =        "Measuring the 4:11 Effect: The Power Failure and the
                 {Internet}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "1",
  number =       "5",
  pages =        "16--18",
  month =        sep # "\slash " # oct,
  year =         "2003",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2003.1236230",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Oct 9 07:39:10 MDT 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2003/05/j5016abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2003/05/j5016.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Amin:2003:NAE,
  author =       "Massoud Amin",
  title =        "{North America}'s Electricity Infrastructure: Are We
                 Ready for More Perfect Storms?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "1",
  number =       "5",
  pages =        "19--25",
  month =        sep # "\slash " # oct,
  year =         "2003",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2003.1236231",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Oct 9 07:39:10 MDT 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2003/05/j5019abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2003/05/j5019.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Capek:2003:MCE,
  author =       "Peter G. Capek and David M. Chess and Steve R. White",
  title =        "{Merry Christma}: An Early Network Worm",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "1",
  number =       "5",
  pages =        "26--34",
  month =        sep # "\slash " # oct,
  year =         "2003",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2003.1236232",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Oct 9 07:39:10 MDT 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2003/05/j5026abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2003/05/j5026.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Orman:2003:MWF,
  author =       "Hilarie Orman",
  title =        "The {Morris} Worm: a Fifteen-Year Perspective",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "1",
  number =       "5",
  pages =        "35--43",
  month =        sep # "\slash " # oct,
  year =         "2003",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2003.1236233",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Oct 9 07:39:10 MDT 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2003/05/j5035abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2003/05/j5035.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Oppliger:2003:DED,
  author =       "Rolf Oppliger and Ruedi Rytz",
  title =        "Digital Evidence: Dream and Reality",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "1",
  number =       "5",
  pages =        "44--48",
  month =        sep # "\slash " # oct,
  year =         "2003",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2003.1236234",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Oct 9 07:39:10 MDT 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2003/05/j5044abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2003/05/j5044.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Hariri:2003:IAF,
  author =       "Salim Hariri and Guangzhi Qu and Tushneem Dharmagadda
                 and Modukuri Ramkishore and Cauligi S. Raghavendra",
  title =        "Impact Analysis of Faults and Attacks in Large-Scale
                 Networks",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "1",
  number =       "5",
  pages =        "49--54",
  month =        sep # "\slash " # oct,
  year =         "2003",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2003.1236235",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Oct 9 07:39:10 MDT 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2003/05/j5049abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2003/05/j5049.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Schneider:2003:LPM,
  author =       "Fred B. Schneider",
  title =        "Least Privilege and More",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "1",
  number =       "5",
  pages =        "55--59",
  month =        sep # "\slash " # oct,
  year =         "2003",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2003.1236236",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Oct 9 07:39:10 MDT 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2003/05/j5055abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2003/05/j5055.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Lenarcic:2003:DBT,
  author =       "John Lenarcic",
  title =        "The Dinosaur and the Butterfly: a Tale of Computer
                 Ethics",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "1",
  number =       "5",
  pages =        "61--63",
  month =        sep # "\slash " # oct,
  year =         "2003",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Oct 9 07:39:10 MDT 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2003/05/j5061abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2003/05/j5061.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Ragsdale:2003:IAW,
  author =       "Dan Ragsdale and Don Welch and Ron Dodge",
  title =        "Information Assurance the {West Point} Way",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "1",
  number =       "5",
  pages =        "64--67",
  month =        sep # "\slash " # oct,
  year =         "2003",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2003.1236238",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Oct 9 07:39:10 MDT 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2003/05/j5064abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2003/05/j5064.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Mead:2003:SFH,
  author =       "Nancy R. Mead",
  title =        "{SEHAS 2003}: The Future of High-Assurance Systems",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "1",
  number =       "5",
  pages =        "68--72",
  month =        sep # "\slash " # oct,
  year =         "2003",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Oct 9 07:39:10 MDT 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2003/05/j5068abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2003/05/j5068.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Lesk:2003:CLR,
  author =       "Michael Lesk",
  title =        "{Chicken Little} and the Recorded Music Crisis",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "1",
  number =       "5",
  pages =        "73--75",
  month =        sep # "\slash " # oct,
  year =         "2003",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2003.1236239",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Oct 9 07:39:10 MDT 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2003/05/j5073abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2003/05/j5073.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Hearn:2003:WW,
  author =       "Jim Hearn",
  title =        "What Works?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "1",
  number =       "5",
  pages =        "76--77",
  month =        sep # "\slash " # oct,
  year =         "2003",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2003.1236240",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Oct 9 07:39:10 MDT 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2003/05/j5076abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2003/05/j5076.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Arce:2003:RG,
  author =       "Iv{\'a}n Arce",
  title =        "The Rise of the Gadgets",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "1",
  number =       "5",
  pages =        "78--81",
  month =        sep # "\slash " # oct,
  year =         "2003",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2003.1236241",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Oct 9 07:39:10 MDT 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2003/05/j5078abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2003/05/j5078.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Camp:2003:AD,
  author =       "Jean Camp",
  title =        "Access Denied",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "1",
  number =       "5",
  pages =        "82--85",
  month =        sep # "\slash " # oct,
  year =         "2003",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2003.1236242",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Oct 9 07:39:10 MDT 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2003/05/j5082abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2003/05/j5082.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Stytz:2003:CPC,
  author =       "Martin Stytz and James A. Whittaker",
  title =        "Caution: This Product Contains Security Code",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "1",
  number =       "5",
  pages =        "86--88",
  month =        sep # "\slash " # oct,
  year =         "2003",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2003.1236243",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Oct 9 07:39:10 MDT 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2003/05/j5086abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2003/05/j5086.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{McCarty:2003:AIT,
  author =       "Bill McCarty",
  title =        "Automated Identity Theft",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "1",
  number =       "5",
  pages =        "89--92",
  month =        sep # "\slash " # oct,
  year =         "2003",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2003.1236244",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Oct 9 07:39:10 MDT 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2003/05/j5089abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2003/05/j5089.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Caloyannides:2003:KOC,
  author =       "Michael Caloyannides",
  title =        "Keeping Offline Computer Usage Private",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "1",
  number =       "5",
  pages =        "93--95",
  month =        sep # "\slash " # oct,
  year =         "2003",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Oct 9 07:39:10 MDT 2003",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2003/05/j5093abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2003/05/j5093.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Cybenko:2003:EPI,
  author =       "George Cybenko",
  title =        "From the {Editors}: Privacy Is the Issue",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "1",
  number =       "6",
  pages =        "5--7",
  month =        nov # "\slash " # dec,
  year =         "2003",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jan 27 18:07:01 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2003/06/j6005.pdf;
                 http://csdl.computer.org/comp/mags/sp/2003/06/j6005abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2003/06/j6005.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Goth:2003:Nb,
  author =       "Greg Goth and Benjamin J. Alfonsi",
  title =        "News",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "1",
  number =       "6",
  pages =        "8--13",
  month =        nov # "\slash " # dec,
  year =         "2003",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jan 27 18:07:01 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2003/06/j6008abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2003/06/j6008.htm;
                 http://csdl.computer.org/dl/mags/sp/2003/06/j6008.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Geer:2003:M,
  author =       "Daniel E. {Geer, Jr.} and Dave Aucsmith and James A.
                 Whittaker",
  title =        "Monoculture",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "1",
  number =       "6",
  pages =        "14--17",
  month =        nov # "\slash " # dec,
  year =         "2003",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2003.1253563",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jan 27 18:07:01 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2003/06/j6014abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2003/06/j6014.htm;
                 http://csdl.computer.org/dl/mags/sp/2003/06/j6014.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Garfinkel:2003:EBI,
  author =       "Simson L. Garfinkel",
  title =        "Email-Based Identification and Authentication: An
                 Alternative to {PKI}?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "1",
  number =       "6",
  pages =        "20--26",
  month =        nov # "\slash " # dec,
  year =         "2003",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2003.1253564",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jan 27 18:07:01 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2003/06/j6020abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2003/06/j6020.htm;
                 http://csdl.computer.org/dl/mags/sp/2003/06/j6020.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Agrawal:2003:MAD,
  author =       "Dakshi Agrawal and Dogan Kesdogan",
  title =        "Measuring Anonymity: The Disclosure Attack",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "1",
  number =       "6",
  pages =        "27--34",
  month =        nov # "\slash " # dec,
  year =         "2003",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2003.1253565",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jan 27 18:07:01 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2003/06/j6027abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2003/06/j6027.htm;
                 http://csdl.computer.org/dl/mags/sp/2003/06/j6027.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Seigneur:2003:PRD,
  author =       "Jean-Marc Seigneur and Christian Damsgaard Jensen",
  title =        "Privacy Recovery with Disposable Email Addresses",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "1",
  number =       "6",
  pages =        "35--39",
  month =        nov # "\slash " # dec,
  year =         "2003",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2003.1253566",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jan 27 18:07:01 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2003/06/j6035abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2003/06/j6035.htm;
                 http://csdl.computer.org/dl/mags/sp/2003/06/j6035.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Rezgui:2003:PWF,
  author =       "Abdelmounaam Rezgui and Athman Bouguettaya and Mohamed
                 Y. Eltoweissy",
  title =        "Privacy on the {Web}: Facts, Challenges, and
                 Solutions",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "1",
  number =       "6",
  pages =        "40--49",
  month =        nov # "\slash " # dec,
  year =         "2003",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2003.1253567",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jan 27 18:07:01 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2003/06/j6040abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2003/06/j6040.htm;
                 http://csdl.computer.org/dl/mags/sp/2003/06/j6040.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Cranor:2003:PMP,
  author =       "Lorrie Faith Cranor",
  title =        "{P3P}: Making Privacy Policies More Useful",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "1",
  number =       "6",
  pages =        "50--55",
  month =        nov # "\slash " # dec,
  year =         "2003",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2003.1253568",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jan 27 18:07:01 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2003/06/j6050abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2003/06/j6050.htm;
                 http://csdl.computer.org/dl/mags/sp/2003/06/j6050.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Quarterman:2003:UIG,
  author =       "John S. Quarterman",
  title =        "The Ultimate in Instant Gratification",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "1",
  number =       "6",
  pages =        "56--58",
  month =        nov # "\slash " # dec,
  year =         "2003",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jan 27 18:07:01 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2003/06/j6056abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2003/06/j6056.htm;
                 http://csdl.computer.org/dl/mags/sp/2003/06/j6056.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Irvine:2003:TCS,
  author =       "Cynthia E. Irvine",
  title =        "Teaching Constructive Security",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "1",
  number =       "6",
  pages =        "59--61",
  month =        nov # "\slash " # dec,
  year =         "2003",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2003.1253570",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jan 27 18:07:01 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2003/06/j6059abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2003/06/j6059.htm;
                 http://csdl.computer.org/dl/mags/sp/2003/06/j6059.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Wing:2003:CAL,
  author =       "Jeannette M. Wing",
  title =        "A Call to Action: Look Beyond the Horizon",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "1",
  number =       "6",
  pages =        "62--67",
  month =        nov # "\slash " # dec,
  year =         "2003",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jan 27 18:07:01 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2003/06/j6062abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2003/06/j6062.htm;
                 http://csdl.computer.org/dl/mags/sp/2003/06/j6062.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Lesk:2003:FFI,
  author =       "Michael Lesk",
  title =        "Feist and Facts: If Data Is Protected, Will It Be More
                 or Less Available?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "1",
  number =       "6",
  pages =        "68--70",
  month =        nov # "\slash " # dec,
  year =         "2003",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2003.1253572",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jan 27 18:07:01 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2003/06/j6068abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2003/06/j6068.htm;
                 http://csdl.computer.org/dl/mags/sp/2003/06/j6068.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Levy:2003:COP,
  author =       "Elias Levy",
  title =        "Crossover: Online Pests Plaguing the Offline World",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "1",
  number =       "6",
  pages =        "71--73",
  month =        nov # "\slash " # dec,
  year =         "2003",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2003.1253573",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jan 27 18:07:01 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2003/06/j6071abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2003/06/j6071.htm;
                 http://csdl.computer.org/dl/mags/sp/2003/06/j6071.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Smith:2003:FTH,
  author =       "S. W. Smith and Jothy Rosenberg and Adam Golodner",
  title =        "A Funny Thing Happened on the Way to the Marketplace",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "1",
  number =       "6",
  pages =        "74--78",
  month =        nov # "\slash " # dec,
  year =         "2003",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2003.1253574",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jan 27 18:07:01 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2003/06/j6074abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2003/06/j6074.htm;
                 http://csdl.computer.org/dl/mags/sp/2003/06/j6074.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{McCarty:2003:HAR,
  author =       "Bill McCarty",
  title =        "The {Honeynet} Arms Race",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "1",
  number =       "6",
  pages =        "79--82",
  month =        nov # "\slash " # dec,
  year =         "2003",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2003.1253575",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jan 27 18:07:01 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2003/06/j6079abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2003/06/j6079.htm;
                 http://csdl.computer.org/dl/mags/sp/2003/06/j6079.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2003:AII,
  author =       "Anonymous",
  title =        "2003 Annual Index {IEEE Security \& Privacy Volume
                 1}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "1",
  number =       "6",
  pages =        "83--88",
  month =        nov # "\slash " # dec,
  year =         "2003",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jan 27 18:07:01 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2003/06/j6083.pdf;
                 http://csdl.computer.org/dl/mags/sp/2003/06/j6083.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Caloyannides:2003:DER,
  author =       "Michael A. Caloyannides",
  title =        "Digital `Evidence' and Reasonable Doubt",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "1",
  number =       "6",
  pages =        "89--91",
  month =        nov # "\slash " # dec,
  year =         "2003",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jan 27 18:07:01 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2003/06/j6089abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2003/06/j6089.htm;
                 http://csdl.computer.org/dl/mags/sp/2003/06/j6089.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Schneier:2003:AH,
  author =       "Bruce Schneier",
  title =        "Airplane Hackers",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "1",
  number =       "6",
  pages =        "92--92",
  month =        nov # "\slash " # dec,
  year =         "2003",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jan 27 18:07:01 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2003/06/j6092abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2003/06/j6092.htm;
                 http://csdl.computer.org/dl/mags/sp/2003/06/j6092.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Schneider:2004:END,
  author =       "Fred B. Schneider",
  title =        "From the {Editors}: The Next Digital Divide",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "1",
  pages =        "5--5",
  month =        jan # "\slash " # feb,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2004.1264838",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Feb 3 11:48:25 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2004/01/j1005.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2004:RT,
  author =       "Anonymous",
  title =        "Reviewer Thanks",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "1",
  pages =        "6--6",
  month =        jan # "\slash " # feb,
  year =         "2004",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Feb 3 11:48:25 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2004/01/j1006.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Weber:2004:LED,
  author =       "Daniel Weber and Jean Camp and Tom {Van Vleck} and Bob
                 Bruen and James Whittaker",
  title =        "Letters to the {Editors}: Digital Rights Management;
                 Change the Game?; No Clear Answers",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "1",
  pages =        "7--9",
  month =        jan # "\slash " # feb,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2004.1264840",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Feb 3 11:48:25 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2004/01/j1007.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Palmer:2004:EBM,
  author =       "Charles C. Palmer",
  title =        "{Editorial Board} Member Profile: Can We Win the
                 Security Game?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "1",
  pages =        "10--12",
  month =        jan # "\slash " # feb,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2004.1264842",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Feb 3 11:48:25 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2004/01/j1010abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/01/j1010.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Goth:2004:NVS,
  author =       "Greg Goth and Pam Frost Gorder",
  title =        "News: {E}-Voting Security: The Electoral Dialect Gets
                 Hot; Balancing Video-Game Piracy Issues",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "1",
  pages =        "14--17",
  month =        jan # "\slash " # feb,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2004.1264844",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Feb 3 11:48:25 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2004/01/j1014abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/01/j1014.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Andresen:2004:NBP,
  author =       "Scott L. Andresen",
  title =        "News Briefs: Policy; Privacy; Security",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "1",
  pages =        "18--19",
  month =        jan # "\slash " # feb,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2004.1264846",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Feb 3 11:48:25 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2004/01/j1020abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/01/j1020.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Stytz:2004:BRW,
  author =       "Martin R. Stytz",
  title =        "Book Reviews: Wireless World Order [{{\em How Secure
                 Is Your Wireless Network? Safeguarding Your Wi-Fi LAN}
                 by Lee Barken}]; No Need to Fear [{{\em Beyond Fear:
                 Thinking Sensibly About Security in an Uncertain
                 World}, by Bruce Schneier}]",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "1",
  pages =        "20--21",
  month =        jan # "\slash " # feb,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2004.1264847",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Feb 3 11:48:25 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2004/01/j1020abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/01/j1020.pdf",
  acknowledgement = ack-nhfb,
  doi-1 =        "https://doi.org/10.1109/MSECP.2004.1264848",
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Dill:2004:GEI,
  author =       "David L. Dill and Aviel D. Rubin",
  title =        "{Guest Editors}' Introduction: {E}-Voting Security",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "1",
  pages =        "22--23",
  month =        jan # "\slash " # feb,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2004.1264849",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Feb 3 11:48:25 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2004/01/j1022.pdf;
                 http://csdl.computer.org/comp/mags/sp/2004/01/j1022abs.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Evans:2004:VES,
  author =       "David Evans and Nathanael Paul",
  title =        "{E}-Voting: Election Security: Perception and
                 Reality",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "1",
  pages =        "24--31",
  month =        jan # "\slash " # feb,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2004.1264850",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Feb 3 11:48:25 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2004/01/j1024abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/01/j1024.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Bannet:2004:VHV,
  author =       "Jonathan Bannet and David W. Price and Algis Rudys and
                 Justin Singer and Dan S. Wallach",
  title =        "{E}-Voting: Hack-a-Vote: Security Issues with
                 Electronic Voting Systems",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "1",
  pages =        "32--37",
  month =        jan # "\slash " # feb,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2004.1264851",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Feb 3 11:48:25 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2004/01/j1032abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/01/j1032.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Chaum:2004:VSB,
  author =       "David Chaum",
  title =        "{E}-Voting: Secret-Ballot Receipts: True
                 Voter-Verifiable Elections",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "1",
  pages =        "38--47",
  month =        jan # "\slash " # feb,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2004.1264852",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Feb 3 11:48:25 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2004/01/j1038abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/01/j1038.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Sklavos:2004:CRC,
  author =       "Nicolas Sklavos and Nikolay Moldovyan and Vladimir
                 Gorodetsky and Odysseas Koufopavlou",
  title =        "Conference Reports: Computer Network Security: Report
                 from {MMM-ACNS}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "1",
  pages =        "49--52",
  month =        jan # "\slash " # feb,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2004.1264853",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Feb 3 11:48:25 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2004/01/j1049abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/01/j1049.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Donner:2004:BTG,
  author =       "Marc Donner",
  title =        "Biblio Tech: {Die Gedanken Sind Frei}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "1",
  pages =        "53--55",
  month =        jan # "\slash " # feb,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2004.1264854",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Feb 3 11:48:25 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2004/01/j1053abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/01/j1053.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Grimaila:2004:EMB,
  author =       "Michael Russell Grimaila",
  title =        "Education: Maximizing Business Information Security's
                 Educational Value",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "1",
  pages =        "56--60",
  month =        jan # "\slash " # feb,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2004.1264855",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Feb 3 11:48:25 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2004/01/j1056abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/01/j1056.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Lesk:2004:DRM,
  author =       "Michael Lesk",
  title =        "Digital Rights: Micropayments: An Idea Whose Time Has
                 Passed Twice?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "1",
  pages =        "61--63",
  month =        jan # "\slash " # feb,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2004.1264856",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Feb 3 11:48:25 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2004/01/j1061abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/01/j1061.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Hearn:2004:GPD,
  author =       "Jim Hearn",
  title =        "Global Perspectives: Does the Common Criteria Paradigm
                 Have a Future?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "1",
  pages =        "64--65",
  month =        jan # "\slash " # feb,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2004.1264857",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Feb 3 11:48:25 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2004/01/j1064abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/01/j1064.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Arce:2004:ATM,
  author =       "Iv{\'a}n Arce",
  title =        "Attack Trends: More Bang For the Bug: An Account of
                 2003's Attack Trends",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "1",
  pages =        "66--68",
  month =        jan # "\slash " # feb,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2004.1264858",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Feb 3 11:48:25 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2004/01/j1066abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/01/j1066.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Smith:2004:SSG,
  author =       "Sean W. Smith and Eugene H. Spafford",
  title =        "Secure Systems: Grand Challenges in Information
                 Security: Process and Output",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "1",
  pages =        "69--71",
  month =        jan # "\slash " # feb,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2004.1264859",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Feb 3 11:48:25 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2004/01/j1069abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/01/j1069.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Stytz:2004:CDD,
  author =       "Martin R. Stytz",
  title =        "Considering Defense in Depth for Software
                 Applications",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "1",
  pages =        "72--75",
  month =        jan # "\slash " # feb,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2004.1264860",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Feb 3 11:48:25 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2004/01/j1072abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/01/j1072.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Krawetz:2004:HFA,
  author =       "Neal Krawetz",
  title =        "The {Honeynet} Files: Anti-Honeypot Technology",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "1",
  pages =        "76--79",
  month =        jan # "\slash " # feb,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2004.1264861",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Feb 3 11:48:25 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2004/01/j1076abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/01/j1076.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Caloyannides:2004:PMO,
  author =       "Michael A. Caloyannides",
  title =        "Privacy Matters: Online Monitoring: Security or Social
                 Control?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "1",
  pages =        "81--83",
  month =        jan # "\slash " # feb,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2004.1264862",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Feb 3 11:48:25 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2004/01/j1081abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/01/j1081.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Schneier:2004:CTV,
  author =       "Bruce Schneier",
  title =        "Clear Text: Voting Security and Technology",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "1",
  pages =        "84--84",
  month =        jan # "\slash " # feb,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2004.1264863",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Feb 3 11:48:25 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2004/01/j1084abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/01/j1084.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Cybenko:2004:EDB,
  author =       "George Cybenko",
  title =        "From the Editors: Don't Bring a Knife to a Gunfight",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "2",
  pages =        "5--5",
  month =        mar # "\slash " # apr,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2004.1281233",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 8 08:08:03 MDT 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2004/02/j2005.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Fischmann:2004:LEE,
  author =       "Matthias Fischmann and Matthias Bauer and Simson
                 Garfinkel",
  title =        "Letters to the Editor: {EBIA} vs. {PKI}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "2",
  pages =        "6--7",
  month =        mar # "\slash " # apr,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2004.1281234",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 8 08:08:03 MDT 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2004/02/j2006.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Stytz:2004:BRH,
  author =       "Martin R. Stytz",
  title =        "Book Reviews: Hacking for Understanding: {{\em
                 Hacking: The Art of Exploitation}, by Jon Erickson}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "2",
  pages =        "8--8",
  month =        mar # "\slash " # apr,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2004.1281235",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 8 08:08:03 MDT 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2004/02/j2008.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Goth:2004:NHU,
  author =       "Greg Goth and Benjamin J. Alfonsi and Scott L.
                 Andresen",
  title =        "News: How Useful Are Attack Trend Resources?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "2",
  pages =        "9--11",
  month =        mar # "\slash " # apr,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2004.1281236",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 8 08:08:03 MDT 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/02/j2009.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Jiwnani:2004:SMN,
  author =       "Kanta Jiwnani and Marvin Zelkowitz",
  title =        "Susceptibility Matrix: a New Aid to Software
                 Auditing",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "2",
  pages =        "16--21",
  month =        mar # "\slash " # apr,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2004.1281240",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 8 08:08:03 MDT 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2004/02/j2016abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/02/j2016.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Byers:2004:ILC,
  author =       "Simon Byers",
  title =        "Information Leakage Caused by Hidden Data in Published
                 Documents",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "2",
  pages =        "23--27",
  month =        mar # "\slash " # apr,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2004.1281241",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 8 08:08:03 MDT 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2004/02/j2023abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/02/j2023.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Gruteser:2004:PPC,
  author =       "Marco Gruteser and Xuan Liu",
  title =        "Protecting Privacy in Continuous Location-Tracking
                 Applications",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "2",
  pages =        "28--34",
  month =        mar # "\slash " # apr,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2004.1281242",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 8 08:08:03 MDT 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2004/02/j2028abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/02/j2028.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anton:2004:FPP,
  author =       "Annie I. Ant{\'o}n and Julia B. Earp and Qingfeng He
                 and William Stufflebeam and Davide Bolchini and
                 University of Lugano and Carlos Jensen",
  title =        "Financial Privacy Policies and the Need for
                 Standardization",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "2",
  pages =        "36--45",
  month =        mar # "\slash " # apr,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2004.1281243",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 8 08:08:03 MDT 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2004/02/j2036abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/02/j2036.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Popli:2004:ACC,
  author =       "Ashish Popli",
  title =        "{ACM Computer and Communication Security Conference}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "2",
  pages =        "46--47",
  month =        mar # "\slash " # apr,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2004.1281244",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 8 08:08:03 MDT 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2004/02/j2046abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/02/j2046.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Weis:2004:RPW,
  author =       "Stephen A. Weis",
  title =        "{RFID} Privacy Workshop: Concerns, Consensus, and
                 Questions",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "2",
  pages =        "48--50",
  month =        mar # "\slash " # apr,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2004.1281245",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 8 08:08:03 MDT 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2004/02/j2048abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/02/j2048.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Donner:2004:HBS,
  author =       "Marc Donner",
  title =        "Hacking the Best-Seller List",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "2",
  pages =        "51--53",
  month =        mar # "\slash " # apr,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2004.1281246",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 8 08:08:03 MDT 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2004/02/j2051abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/02/j2051.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Bishop:2004:TRP,
  author =       "Matt Bishop and Deb Frincke",
  title =        "Teaching Robust Programming",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "2",
  pages =        "54--57",
  month =        mar # "\slash " # apr,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2004.1281247",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 8 08:08:03 MDT 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2004/02/j2054abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/02/j2054.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Payne:2004:RIS,
  author =       "Jeffery E. Payne",
  title =        "Regulation and Information Security: Can {Y2K} Lessons
                 Help Us?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "2",
  pages =        "58--61",
  month =        mar # "\slash " # apr,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2004.1281248",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 8 08:08:03 MDT 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2004/02/j2058abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/02/j2058.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Lesk:2004:SLC,
  author =       "Michael Lesk",
  title =        "Shedding Light on Creativity: The History of
                 Photography",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "2",
  pages =        "62--64",
  month =        mar # "\slash " # apr,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2004.1281249",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 8 08:08:03 MDT 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2004/02/j2062abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/02/j2062.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Levy:2004:CBT,
  author =       "Elias Levy",
  title =        "Criminals Become Tech Savvy",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "2",
  pages =        "65--68",
  month =        mar # "\slash " # apr,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2004.1281250",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 8 08:08:03 MDT 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2004/02/j2065abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/02/j2065.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Wayner:2004:PCC,
  author =       "Peter Wayner",
  title =        "The Power of Candy-Coated Bits",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "2",
  pages =        "69--72",
  month =        mar # "\slash " # apr,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2004.1281251",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 8 08:08:03 MDT 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2004/02/j2069abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/02/j2069.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Trope:2004:WC,
  author =       "Roland L. Trope",
  title =        "A Warranty of Cyberworthiness",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "2",
  pages =        "73--76",
  month =        mar # "\slash " # apr,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2004.1281252",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 8 08:08:03 MDT 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2004/02/j2073abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/02/j2073.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Chamales:2004:HCR,
  author =       "George Chamales",
  title =        "The {Honeywall CD-ROM}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "2",
  pages =        "77--79",
  month =        mar # "\slash " # apr,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2004.1281253",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 8 08:08:03 MDT 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2004/02/j2077abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/02/j2077.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{McGraw:2004:SS,
  author =       "Gary McGraw",
  title =        "Software Security",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "2",
  pages =        "80--83",
  month =        mar # "\slash " # apr,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2004.1281254",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 8 08:08:03 MDT 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2004/02/j2080abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/02/j2080.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Caloyannides:2004:CCF,
  author =       "Michael A. Caloyannides",
  title =        "The Cost of Convenience: a {Faustian} Deal",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "2",
  pages =        "84--87",
  month =        mar # "\slash " # apr,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2004.1281255",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Apr 8 08:08:03 MDT 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2004/02/j2084abs.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/02/j2084.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Donner:2004:EWD,
  author =       "Marc Donner",
  title =        "From the Editors: Whose Data Are These, Anyway?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "3",
  pages =        "5--6",
  month =        may # "\slash " # jun,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2004.12",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 4 07:44:23 MDT 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/03/j3005.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Pfleeger:2004:BRG,
  author =       "Shari Lawrence Pfleeger",
  title =        "Book Reviews: a Gift of Impact: {{\em A Gift of Fire:
                 The Social, Legal, and Ethical Issues for Computers and
                 the Internet}, by Sara Baase (Prentice-Hall 2002, ISBN
                 0-13-008215-5)}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "3",
  pages =        "7--7",
  month =        may # "\slash " # jun,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2004.5",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 4 07:44:23 MDT 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/03/j3007.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Li:2004:LEI,
  author =       "Hong-Lok Li and Stan Bush",
  title =        "Letters to the Editor: Interface: Usability,
                 efficiency --- or privacy?; Does piracy increase
                 sales?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "3",
  pages =        "8--9",
  month =        may # "\slash " # jun,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2004.15",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 4 07:44:23 MDT 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/03/j3008.htm;
                 j3008.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Goth:2004:NRC,
  author =       "Greg Goth and Scott L. Andresen",
  title =        "News: {Richard Clarke} Talks Cybersecurity and
                 {JELL-O}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "3",
  pages =        "11--15",
  month =        may # "\slash " # jun,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2004.18",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 4 07:44:23 MDT 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/03/j3011.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/03/j3011.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Davis:2004:PPS,
  author =       "Noopur Davis and Watts Humphrey and Samuel T.
                 {Redwine, Jr.} and Gerlinde Zibulski and Gary McGraw",
  title =        "Processes for Producing Secure Software: Summary of
                 {US National Cybersecurity Summit Subgroup Report}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "3",
  pages =        "18--25",
  month =        may # "\slash " # jun,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2004.21",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 4 07:44:23 MDT 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/03/j3018.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/03/j3018.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Arbaugh:2004:GEI,
  author =       "William A. Arbaugh",
  title =        "{Guest Editor}'s Introduction: Wired on Wireless",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "3",
  pages =        "26--27",
  month =        may # "\slash " # jun,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2004.14",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 4 07:44:23 MDT 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/03/j3026.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Hu:2004:SSW,
  author =       "Yih-Chun Hu and Adrian Perrig",
  title =        "A Survey of Secure Wireless Ad Hoc Routing",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "3",
  pages =        "28--39",
  month =        may # "\slash " # jun,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2004.1",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 4 07:44:23 MDT 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/03/j3028.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/03/j3028.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Johnston:2004:OIS,
  author =       "David Johnston and Jesse Walker",
  title =        "Overview of {IEEE 802.16} Security",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "3",
  pages =        "40--48",
  month =        may # "\slash " # jun,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2004.20",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 4 07:44:23 MDT 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/03/j3040.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/03/j3040.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Hubaux:2004:SPS,
  author =       "Jean-Pierre Hubaux and Srdjan Capkun and Jun Luo",
  title =        "The Security and Privacy of Smart Vehicles",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "3",
  pages =        "49--55",
  month =        may # "\slash " # jun,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2004.26",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 4 07:44:23 MDT 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/03/j3049.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/03/j3049.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Branch:2004:AWL,
  author =       "Joel W. Branch and Nick L. {Petroni, Jr.} and Leendert
                 {Van Doorn} and David Safford",
  title =        "Autonomic 802.11 Wireless {LAN} Security Auditing",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "3",
  pages =        "56--65",
  month =        may # "\slash " # jun,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2004.4",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 4 07:44:23 MDT 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/03/j3056.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/03/j3056.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Donner:2004:CC,
  author =       "Marc Donner",
  title =        "Cult Classics",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "3",
  pages =        "66--68",
  month =        may # "\slash " # jun,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2004.11",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 4 07:44:23 MDT 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/03/j3066.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/03/j3066.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Frincke:2004:GCK,
  author =       "Deborah A. Frincke and Matt Bishop",
  title =        "Guarding the Castle Keep: Teaching with the Fortress
                 Metaphor",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "3",
  pages =        "69--72",
  month =        may # "\slash " # jun,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2004.13",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 4 07:44:23 MDT 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/03/j3069.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/03/j3069.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Stolfo:2004:WAE,
  author =       "Salvatore J. Stolfo",
  title =        "Worm and Attack Early Warning",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "3",
  pages =        "73--75",
  month =        may # "\slash " # jun,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2004.28",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 4 07:44:23 MDT 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/03/j3073.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/03/j3073.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Lesk:2004:DRC,
  author =       "Michael Lesk",
  title =        "Digital Rights: Copyright and Creativity",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "3",
  pages =        "76--78",
  month =        may # "\slash " # jun,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2004.6",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 4 07:44:23 MDT 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/03/j3076.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/03/j3076.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Arce:2004:KC,
  author =       "Iva{\'a}n Arce",
  title =        "The Kernel Craze",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "3",
  pages =        "79--81",
  month =        may # "\slash " # jun,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2004.25",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 4 07:44:23 MDT 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/03/j3079.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/03/j3079.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Vilardo:2004:OIS,
  author =       "Mark F. Vilardo",
  title =        "Online Impersonation in Securities Scams",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "3",
  pages =        "82--85",
  month =        may # "\slash " # jun,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2004.19",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 4 07:44:23 MDT 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/03/j3082.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/03/j3082.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Ford:2004:WS,
  author =       "Richard Ford",
  title =        "The Wrong Stuff?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "3",
  pages =        "86--89",
  month =        may # "\slash " # jun,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2004.27",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 4 07:44:23 MDT 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/03/j3086.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/03/j3086.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Hope:2004:MAC,
  author =       "Paco Hope and Gary McGraw and Annie I. Ant{\'o}n",
  title =        "Misuse and Abuse Cases: Getting Past the Positive",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "3",
  pages =        "90--92",
  month =        may # "\slash " # jun,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2004.17",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 4 07:44:23 MDT 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/03/j3090.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/03/j3090.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Caloyannides:2004:SC,
  author =       "Michael A. Caloyannides",
  title =        "Security or Cosmetology?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "3",
  pages =        "93--95",
  month =        may # "\slash " # jun,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2004.23",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 4 07:44:23 MDT 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/03/j3093.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/03/j3093.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Schneier:2004:SC,
  author =       "Bruce Schneier",
  title =        "Security and Compliance",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "3",
  pages =        "96--96",
  month =        may # "\slash " # jun,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2004.22",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 4 07:44:23 MDT 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/03/j3096.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/03/j3096.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Donner:2004:EWL,
  author =       "Marc Donner",
  title =        "From the Editors: a Witty Lesson",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "4",
  pages =        "5--5",
  month =        jul # "\slash " # aug,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2004.44",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 4 07:44:24 MDT 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/04/j4005.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Spencer:2004:LEI,
  author =       "Brad Spencer and Michael A. Caloyannides",
  title =        "Letters to the Editor: Interface: Machine Gun or
                 Blunderbuss?; Usability or privacy redux; Erratum",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "4",
  pages =        "7--8",
  month =        jul # "\slash " # aug,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2004.51",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 4 07:44:24 MDT 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/04/j4007.htm;
                 j4007.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Forbes:2004:BRN,
  author =       "Scott Forbes",
  title =        "Book Reviews: {{\em A .NET Gold Mine: .NET Security
                 and Cryptography}, by Peter Thorsteinson and G. Gnana
                 Arun Ganesh (Prentice-Hall 2004, ISBN 0-13-100851-X)}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "4",
  pages =        "10--10",
  month =        jul # "\slash " # aug,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2004.38",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 4 07:44:24 MDT 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/04/j4010.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Stone:2004:NDB,
  author =       "Adam Stone and Benjamin Alfonsi and Scott L.
                 Andresen",
  title =        "News: The Delicate Balance: Security and Privacy;
                 Corporate Security Under Siege; News Briefs",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "4",
  pages =        "12--13",
  month =        jul # "\slash " # aug,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2004.53",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 4 07:44:24 MDT 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/04/j4012.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Arce:2004:GEI,
  author =       "Iv{\'a}an Arce and Gary McGraw",
  title =        "{Guest Editors}' Introduction: Why Attacking Systems
                 Is a Good Idea",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "4",
  pages =        "17--19",
  month =        jul # "\slash " # aug,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2004.46",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 4 07:44:24 MDT 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/04/j4017.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Pincus:2004:BSS,
  author =       "Jonathan Pincus and Brandon Baker",
  title =        "Beyond Stack Smashing: Recent Advances in Exploiting
                 Buffer Overruns",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "4",
  pages =        "20--27",
  month =        jul # "\slash " # aug,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2004.36",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 4 07:44:24 MDT 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/04/j4020.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/04/j4020.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Meinel:2004:CTC,
  author =       "Carolyn P. Meinel",
  title =        "{Cybercrime Treaty} Could Chill Research",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "4",
  pages =        "28--32",
  month =        jul # "\slash " # aug,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2004.40",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 4 07:44:24 MDT 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/04/j4028.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/04/j4028.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{White:2004:AUF,
  author =       "Greg White and Art Conklin",
  title =        "The Appropriate Use of Force-on-Force Cyberexercises",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "4",
  pages =        "33--37",
  month =        jul # "\slash " # aug,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2004.58",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 4 07:44:24 MDT 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/04/j4033.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/04/j4033.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Ring:2004:TLS,
  author =       "Sandra Ring and Eric Cole",
  title =        "Taking a Lesson from Stealthy Rootkits",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "4",
  pages =        "38--45",
  month =        jul # "\slash " # aug,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2004.57",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 4 07:44:24 MDT 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/04/j4038.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/04/j4038.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Shannon:2004:SWW,
  author =       "Colleen Shannon and David Moore",
  title =        "The Spread of the Witty Worm",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "4",
  pages =        "46--50",
  month =        jul # "\slash " # aug,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2004.59",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 4 07:44:24 MDT 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/04/j4046.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/04/j4046.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Donner:2004:DEM,
  author =       "Marc Donner",
  title =        "Deus Est Machina",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "4",
  pages =        "51--53",
  month =        jul # "\slash " # aug,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2004.1281246",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 4 07:44:24 MDT 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/04/j4051.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/04/j4051.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Frincke:2004:BS,
  author =       "Deborah Frincke and Matt Bishop",
  title =        "Back to School",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "4",
  pages =        "54--56",
  month =        jul # "\slash " # aug,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2004.35",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 4 07:44:24 MDT 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/04/j4054.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/04/j4054.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Elliott:2004:QC,
  author =       "Chip Elliott",
  title =        "Quantum Cryptography",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "4",
  pages =        "57--61",
  month =        jul # "\slash " # aug,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2004.54",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 4 07:44:24 MDT 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/04/j4057.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/04/j4057.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Lesk:2004:BSS,
  author =       "Michael Lesk",
  title =        "Bigger Share of a Smaller Pie",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "4",
  pages =        "62--64",
  month =        jul # "\slash " # aug,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2004.1281249",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 4 07:44:24 MDT 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/04/j4062.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/04/j4062.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Levy:2004:AZ,
  author =       "Elias Levy",
  title =        "Approaching Zero",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "4",
  pages =        "65--66",
  month =        jul # "\slash " # aug,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2004.1281250",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 4 07:44:24 MDT 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/04/j4065.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/04/j4065.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Guida:2004:DUP,
  author =       "Richard Guida and Robert Stahl and Thomas Bunt and
                 Gary Secrest and Joseph Moorcones",
  title =        "Deploying and Using Public Key Technology: Lessons
                 Learned in Real Life",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "4",
  pages =        "67--71",
  month =        jul # "\slash " # aug,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2004.41",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 4 07:44:24 MDT 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/04/j4067.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/04/j4067.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Raynal:2004:HFPa,
  author =       "Frederic Raynal and Yann Berthier and Philippe Biondi
                 and Danielle Kaminsky",
  title =        "Honeypot Forensics {Part I}: Analyzing the Network",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "4",
  pages =        "72--78",
  month =        jul # "\slash " # aug,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2004.47",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 4 07:44:24 MDT 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/04/j4072.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/04/j4072.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Verdon:2004:RAS,
  author =       "Denis Verdon and Gary McGraw",
  title =        "Risk Analysis in Software Design",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "4",
  pages =        "79--84",
  month =        jul # "\slash " # aug,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2004.55",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 4 07:44:24 MDT 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/04/j4079.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/04/j4079.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Caloyannides:2004:PRC,
  author =       "Michael A. Caloyannides",
  title =        "Is Privacy Really Constraining Security or Is this a
                 Red Herring?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "4",
  pages =        "86--87",
  month =        jul # "\slash " # aug,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2004.50",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 4 07:44:24 MDT 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/04/j4086.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/04/j4086.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Schneier:2004:CPW,
  author =       "Bruce Schneier",
  title =        "Customers, Passwords, and {Web} Sites",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "4",
  pages =        "88--88",
  month =        jul # "\slash " # aug,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2004.39",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 4 07:44:24 MDT 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/04/j4088.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/04/j4088.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Schneider:2004:TSI,
  author =       "Fred Schneider",
  title =        "Time Out for Station Identification",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "5",
  pages =        "5--5",
  month =        sep # "\slash " # oct,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2004.88",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Dec 11 18:47:37 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2004/05/j5005.pdf;
                 http://csdl.computer.org/dl/mags/sp/2004/05/j5005.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2004:LE,
  author =       "Anonymous",
  title =        "Letters to the {Editor}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "5",
  pages =        "6--7",
  month =        sep # "\slash " # oct,
  year =         "2004",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Dec 11 18:47:37 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2004/05/j5006.pdf;
                 http://csdl.computer.org/dl/mags/sp/2004/05/j5006.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Goth:2004:Na,
  author =       "Greg Goth",
  title =        "News",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "5",
  pages =        "8--11",
  month =        sep # "\slash " # oct,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2004.79",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Dec 11 18:47:37 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2004/05/j5008.pdf;
                 http://csdl.computer.org/dl/mags/sp/2004/05/j5008.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2004:PCP,
  author =       "Anonymous",
  title =        "Protecting Consumers' Private Health Information",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "5",
  pages =        "12--12",
  month =        sep # "\slash " # oct,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2004.82",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Dec 11 18:47:37 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2004/05/j5012.pdf;
                 http://csdl.computer.org/dl/mags/sp/2004/05/j5012.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Cranor:2004:GEI,
  author =       "Lorrie Faith Cranor and Simson Garfinkel",
  title =        "{Guest Editors}' Introduction: Secure or Usable?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "5",
  pages =        "16--18",
  month =        sep # "\slash " # oct,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2004.69",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Dec 11 18:47:37 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2004/05/j5016.pdf;
                 http://csdl.computer.org/dl/mags/sp/2004/05/j5016.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Balfanz:2004:SUS,
  author =       "Dirk Balfanz and Glenn Durfee and Rebecca E. Grinter
                 and D. K. Smetters",
  title =        "In Search of Usable Security: Five Lessons from the
                 Field",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "5",
  pages =        "19--24",
  month =        sep # "\slash " # oct,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2004.71",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Dec 11 18:47:37 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/05/j5019.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/05/j5019.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Yan:2004:PMS,
  author =       "Jeff Yan and Alan Blackwell and Ross Anderson and
                 Alasdair Grant",
  title =        "Password Memorability and Security: Empirical
                 Results",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "5",
  pages =        "25--31",
  month =        sep # "\slash " # oct,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2004.81",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Dec 11 18:47:37 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/05/j5025.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/05/j5025.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Just:2004:DEC,
  author =       "Mike Just",
  title =        "Designing and Evaluating Challenge-Question Systems",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "5",
  pages =        "32--39",
  month =        sep # "\slash " # oct,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2004.80",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Dec 11 18:47:37 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/05/j5032.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/05/j5032.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Peacock:2004:TPK,
  author =       "Alen Peacock and Xian Ke and Matthew Wilkerson",
  title =        "Typing Patterns: a Key to User Identification",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "5",
  pages =        "40--47",
  month =        sep # "\slash " # oct,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2004.89",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Dec 11 18:47:37 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2004/extras/j5040x1.pdf;
                 http://csdl.computer.org/comp/mags/sp/2004/extras/j5040x2.pdf;
                 http://csdl.computer.org/dl/mags/sp/2004/05/j5040.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/05/j5040.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Yee:2004:ASU,
  author =       "Ka-Ping Yee",
  title =        "Aligning Security and Usability",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "5",
  pages =        "48--55",
  month =        sep # "\slash " # oct,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2004.64",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Dec 11 18:47:37 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/05/j5048.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/05/j5048.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Donner:2004:JG,
  author =       "Marc Donner",
  title =        "{Jennifer Government}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "5",
  pages =        "57--59",
  month =        sep # "\slash " # oct,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2004.74",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Dec 11 18:47:37 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/05/j5057.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/05/j5057.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Frincke:2004:JSE,
  author =       "Deborah Frincke and Matt Bishop",
  title =        "Joining the Security Education Community",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "5",
  pages =        "61--63",
  month =        sep # "\slash " # oct,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2004.75",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Dec 11 18:47:37 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/05/j5061.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/05/j5061.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Saydjari:2004:MSR,
  author =       "O. Sami Saydjari",
  title =        "Multilevel Security: Reprise",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "5",
  pages =        "64--67",
  month =        sep # "\slash " # oct,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2004.78",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Dec 11 18:47:37 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/05/j5064.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/05/j5064.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Andrews:2004:CS,
  author =       "Mike Andrews and James A. Whittaker",
  title =        "Computer Security",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "5",
  pages =        "68--71",
  month =        sep # "\slash " # oct,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2004.66",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Dec 11 18:47:37 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/05/j5068.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/05/j5068.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Arce:2004:SG,
  author =       "Iv{\'a}n Arce",
  title =        "The Shellcode Generation",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "5",
  pages =        "72--76",
  month =        sep # "\slash " # oct,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2004.87",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Dec 11 18:47:37 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/05/j5072.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/05/j5072.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Raynal:2004:HFPb,
  author =       "Frederic Raynal and Yann Berthier and Philippe Biondi
                 and Danielle Kaminsky",
  title =        "Honeypot Forensics, {Part II}: Analyzing the
                 Compromised Host",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "5",
  pages =        "77--80",
  month =        sep # "\slash " # oct,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2004.70",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Dec 11 18:47:37 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/05/j5077.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/05/j5077.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{McGraw:2004:SST,
  author =       "Gary McGraw and Bruce Potter",
  title =        "Software Security Testing",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "5",
  pages =        "81--85",
  month =        sep # "\slash " # oct,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2004.84",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Dec 11 18:47:37 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/05/j5081.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/05/j5081.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Caloyannides:2004:SPT,
  author =       "Michael A. Caloyannides",
  title =        "Speech Privacy Technophobes Need Not Apply",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "5",
  pages =        "86--87",
  month =        sep # "\slash " # oct,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2004.85",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Dec 11 18:47:37 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/05/j5086.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/05/j5086.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Schneier:2004:SSP,
  author =       "Bruce Schneier",
  title =        "{SIMS}: Solution, or Part of the Problem?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "5",
  pages =        "88--88",
  month =        sep # "\slash " # oct,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2004.83",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Dec 11 18:47:37 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/05/j5088.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/05/j5088.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Cybenko:2004:SA,
  author =       "George Cybenko",
  title =        "Security Alchemy",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "6",
  pages =        "5--5",
  month =        nov # "\slash " # dec,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2004.110",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Dec 11 18:47:37 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2004/06/j6005.pdf;
                 http://csdl.computer.org/dl/mags/sp/2004/06/j6005.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Forbes:2004:PLR,
  author =       "Scott Forbes",
  title =        "Privacy Law Resource for Students and Professionals",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "6",
  pages =        "7--7",
  month =        nov # "\slash " # dec,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2004.107",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Dec 11 18:47:37 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2004/06/j6007.pdf;
                 http://csdl.computer.org/dl/mags/sp/2004/06/j6007.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Goth:2004:Nb,
  author =       "Greg Goth and Benjamin Alfonsi",
  title =        "News",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "6",
  pages =        "8--9",
  month =        nov # "\slash " # dec,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2004.106",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Dec 11 18:47:37 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2004/06/j6008.pdf;
                 http://csdl.computer.org/dl/mags/sp/2004/06/j6008.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anton:2004:IJP,
  author =       "Annie I. Ant{\'o}n and Qingfeng He and David L.
                 Baumer",
  title =        "Inside {JetBlue}'s Privacy Policy Violations",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "6",
  pages =        "12--18",
  month =        nov # "\slash " # dec,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2004.103",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Dec 11 18:47:37 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/06/j6012.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/06/j6012.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Vaidya:2004:PPD,
  author =       "Jaideep Vaidya and Chris Clifton",
  title =        "Privacy-Preserving Data Mining: Why, How, and When",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "6",
  pages =        "19--27",
  month =        nov # "\slash " # dec,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2004.108",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Dec 11 18:47:37 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/06/j6019.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/06/j6019.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Shankar:2004:COS,
  author =       "K. S. Shankar and Helmut Kurth",
  title =        "Certifying Open Source---The {Linux} Experience",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "6",
  pages =        "28--33",
  month =        nov # "\slash " # dec,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2004.96",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Dec 11 18:47:37 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/06/j6028.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/06/j6028.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Bakken:2004:DOA,
  author =       "David E. Bakken and Rupa Parameswaran and Douglas M.
                 Blough and Andy A. Franz and Ty J. Palmer",
  title =        "Data Obfuscation: Anonymity and Desensitization of
                 Usable Data Sets",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "6",
  pages =        "34--41",
  month =        nov # "\slash " # dec,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2004.97",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Dec 11 18:47:37 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/06/j6034.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/06/j6034.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Aslam:2004:KTI,
  author =       "Javed Aslam and Sergey Bratus and David Kotz and Ron
                 Peterson and Brett Tofel and Daniela Rus",
  title =        "The {Kerf Toolkit} for Intrusion Analysis",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "6",
  pages =        "42--52",
  month =        nov # "\slash " # dec,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2004.113",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Dec 11 18:47:37 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/06/j6042.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/06/j6042.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Donner:2004:UFL,
  author =       "Marc Donner",
  title =        "Use the Force, {Luke}!",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "6",
  pages =        "53--55",
  month =        nov # "\slash " # dec,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSECP.2004.1264854",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Dec 11 18:47:37 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/06/j6053.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/06/j6053.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Frincke:2004:ADP,
  author =       "Deborah Frincke and Matt Bishop",
  title =        "Academic Degrees and Professional Certification",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "6",
  pages =        "56--58",
  month =        nov # "\slash " # dec,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2004.91",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Dec 11 18:47:37 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/06/j6056.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/06/j6056.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Evans:2004:RBS,
  author =       "Shelby Evans and David Heinbuch and Elizabeth Kyule
                 and John Piorkowski and James Wallner",
  title =        "Risk-based Systems Security Engineering: Stopping
                 Attacks with Intention",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "6",
  pages =        "59--62",
  month =        nov # "\slash " # dec,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2004.109",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Dec 11 18:47:37 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/06/j6059.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/06/j6059.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Howard:2004:BMS,
  author =       "Michael Howard",
  title =        "Building More Secure Software with Improved
                 Development Processes",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "6",
  pages =        "63--65",
  month =        nov # "\slash " # dec,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2004.95",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Dec 11 18:47:37 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/06/j6063.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/06/j6063.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Levy:2004:II,
  author =       "Elias Levy",
  title =        "Interface Illusions",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "6",
  pages =        "66--69",
  month =        nov # "\slash " # dec,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2004.104",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Dec 11 18:47:37 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/06/j6066.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/06/j6066.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Somayaji:2004:HWE,
  author =       "Anil Somayaji",
  title =        "How to Win and Evolutionary Arms Race",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "6",
  pages =        "70--72",
  month =        nov # "\slash " # dec,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2004.100",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Dec 11 18:47:37 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/06/j6070.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/06/j6070.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Levine:2004:UHP,
  author =       "John G. Levine and Julian B. Grizzard and Henry L.
                 Owen",
  title =        "Using Honeynets to Protect Large Enterprise Networks",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "6",
  pages =        "73--75",
  month =        nov # "\slash " # dec,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2004.115",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Dec 11 18:47:37 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/06/j6073.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/06/j6073.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Chess:2004:SAS,
  author =       "Brian Chess and Gary McGraw",
  title =        "Static Analysis for Security",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "6",
  pages =        "76--79",
  month =        nov # "\slash " # dec,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2004.111",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Dec 11 18:47:37 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/06/j6076.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/06/j6076.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2004:AI,
  author =       "Anonymous",
  title =        "2004 Annual Index",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "6",
  pages =        "80--85",
  month =        nov # "\slash " # dec,
  year =         "2004",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Dec 11 18:47:37 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2004/06/j6080.pdf;
                 http://csdl.computer.org/dl/mags/sp/2004/06/j6080.htm",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Caloyannides:2004:ESC,
  author =       "Michael Caloyannides",
  title =        "Enhancing Security: Not for the Conformist",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "2",
  number =       "6",
  pages =        "88, 86--87",
  month =        nov # "\slash " # dec,
  year =         "2004",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2004.98",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Dec 11 18:47:37 MST 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/dl/mags/sp/2004/06/j6088.htm;
                 http://csdl.computer.org/dl/mags/sp/2004/06/j6088.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Landwehr:2005:CPP,
  author =       "C. Landwehr",
  title =        "Changing the Puzzle Pieces",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "3",
  number =       "1",
  pages =        "3--4",
  month =        jan # "\slash " # feb,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2005.9",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 26 18:29:12 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/30310/01392686.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=30310&arnumber=1392686&count=17&index=0",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Sytz:2005:SAI,
  author =       "M. R. Sytz",
  title =        "Studying Attacks to Improve Software Defense",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "3",
  number =       "1",
  pages =        "11--11",
  month =        jan # "\slash " # feb,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2005.25",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 26 18:29:12 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/30310/01392692.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=30310&arnumber=1392692&count=17&index=1",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anderson:2005:GEI,
  author =       "R. Anderson and B. Schneier",
  title =        "{Guest Editors}' Introduction: Economics of
                 Information Security",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "3",
  number =       "1",
  pages =        "12--13",
  month =        jan # "\slash " # feb,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2005.14",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 26 18:29:12 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/30310/01392693.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=30310&arnumber=1392693&count=17&index=2",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Rescorla:2005:FSH,
  author =       "E. Rescorla",
  title =        "Is finding security holes a good idea?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "3",
  number =       "1",
  pages =        "14--19",
  month =        jan # "\slash " # feb,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2005.17",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 26 18:29:12 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/30310/01392694.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=30310&arnumber=1392694&count=17&index=3",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Arora:2005:ESV,
  author =       "A. Arora and R. Telang",
  title =        "Economics of software vulnerability disclosure",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "3",
  number =       "1",
  pages =        "20--25",
  month =        jan # "\slash " # feb,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2005.12",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 26 18:29:12 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/30310/01392695.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=30310&arnumber=1392695&count=17&index=4",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Acquisti:2005:PRI,
  author =       "A. Acquisti and J. Grossklags",
  title =        "Privacy and rationality in individual decision
                 making",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "3",
  number =       "1",
  pages =        "26--33",
  month =        jan # "\slash " # feb,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2005.22",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 26 18:29:12 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/30310/01392696.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=30310&arnumber=1392696&count=17&index=5",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Varian:2005:DDC,
  author =       "H. Varian and F. Wallenberg and G. Woroch",
  title =        "The demographics of the do-not-call list [security of
                 data]",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "3",
  number =       "1",
  pages =        "34--39",
  month =        jan # "\slash " # feb,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2005.28",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 26 18:29:12 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/30310/01392697.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=30310&arnumber=1392697&count=17&index=6",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Schechter:2005:TEM,
  author =       "S. E. Schechter",
  title =        "Toward econometric models of the security risk from
                 remote attacks",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "3",
  number =       "1",
  pages =        "40--44",
  month =        jan # "\slash " # feb,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2005.30",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 26 18:29:12 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/30310/01392698.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=30310&arnumber=1392698&count=17&index=7",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Danezis:2005:ERC,
  author =       "G. Danezis and R. Anderson",
  title =        "The economics of resisting censorship",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "3",
  number =       "1",
  pages =        "45--50",
  month =        jan # "\slash " # feb,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2005.29",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 26 18:29:12 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/30310/01392699.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=30310&arnumber=1392699&count=17&index=8",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Linn:2005:TWU,
  author =       "J. Linn",
  title =        "Technology and {Web} user data privacy --- a survey of
                 risks and countermeasures",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "3",
  number =       "1",
  pages =        "52--58",
  month =        jan # "\slash " # feb,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2005.27",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 26 18:29:12 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/30310/01392701.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=30310&arnumber=1392701&count=17&index=9",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Yasinsac:2005:CAE,
  author =       "A. Yasinsac and M. Burmester",
  title =        "Centers of academic excellence: a case study",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "3",
  number =       "1",
  pages =        "62--65",
  month =        jan # "\slash " # feb,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2005.8",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 26 18:29:12 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/30310/01392703.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=30310&arnumber=1392703&count=17&index=10",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Thompson:2005:APT,
  author =       "H. H. Thompson",
  title =        "Application penetration testing",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "3",
  number =       "1",
  pages =        "66--69",
  month =        jan # "\slash " # feb,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2005.3",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 26 18:29:12 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/30310/01392704.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=30310&arnumber=1392704&count=17&index=11",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Arce:2005:BP,
  author =       "I. Arce",
  title =        "Bad peripherals",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "3",
  number =       "1",
  pages =        "70--73",
  month =        jan # "\slash " # feb,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2005.6",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 26 18:29:12 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/30310/01392705.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=30310&arnumber=1392705&count=17&index=12",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Adams:2005:BSW,
  author =       "C. Adams",
  title =        "Building secure {Web}-based environments:
                 understanding research interrelationships through a
                 construction metaphor",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "3",
  number =       "1",
  pages =        "74--77",
  month =        jan # "\slash " # feb,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2005.7",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 26 18:29:12 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/30310/01392706.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=30310&arnumber=1392706&count=17&index=13",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Trope:2005:DDF,
  author =       "R. L. Trope",
  title =        "Directors' digital fiduciary duties",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "3",
  number =       "1",
  pages =        "78--82",
  month =        jan # "\slash " # feb,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2005.11",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 26 18:29:12 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/30310/01392707.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=30310&arnumber=1392707&count=17&index=14",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Arkin:2005:SPT,
  author =       "B. Arkin and S. Stender and G. McGraw",
  title =        "Software penetration testing",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "3",
  number =       "1",
  pages =        "84--87",
  month =        jan # "\slash " # feb,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2005.23",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 26 18:29:12 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/30310/01392709.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=30310&arnumber=1392709&count=17&index=15",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Schneier:2005:AE,
  author =       "B. Schneier",
  title =        "Authentication and Expiration",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "3",
  number =       "1",
  pages =        "88--88",
  month =        jan # "\slash " # feb,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2005.4",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 26 18:29:12 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/30310/01392710.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=30310&arnumber=1392710&count=17&index=16",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Donner:2005:WN,
  author =       "M. Donner",
  title =        "What's in a Name?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "3",
  number =       "2",
  pages =        "4--5",
  month =        mar # "\slash " # apr,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2005.56",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 26 18:29:12 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/30742/01423949.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=30742&arnumber=1423949&count=15&index=0",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Weiss:2005:C,
  author =       "S. A. Weiss",
  title =        "{Crypto 2004}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "3",
  number =       "2",
  pages =        "11--13",
  month =        mar # "\slash " # apr,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2005.39",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 26 18:29:12 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/30742/01423953.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=30742&arnumber=1423953&count=15&index=1",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Iverson:2005:FC,
  author =       "R. Iverson",
  title =        "A Framework to Consider",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "3",
  number =       "2",
  pages =        "14--14",
  month =        mar # "\slash " # apr,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2005.31",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 26 18:29:12 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/30742/01423954.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=30742&arnumber=1423954&count=15&index=2",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Oppliger:2005:DTC,
  author =       "R. Oppliger and R. Rytz",
  title =        "Does trusted computing remedy computer security
                 problems?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "3",
  number =       "2",
  pages =        "16--19",
  month =        mar # "\slash " # apr,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2005.40",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 26 18:29:12 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/30742/01423956.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=30742&arnumber=1423956&count=15&index=3",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Iliev:2005:PCP,
  author =       "A. Iliev and S. W. Smith",
  title =        "Protecting client privacy with trusted computing at
                 the server",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "3",
  number =       "2",
  pages =        "20--28",
  month =        mar # "\slash " # apr,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2005.49",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 26 18:29:12 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/30742/01423957.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=30742&arnumber=1423957&count=15&index=4",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Jutla:2005:SAO,
  author =       "D. N. Jutla and P. Bodorik",
  title =        "Sociotechnical architecture for online privacy",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "3",
  number =       "2",
  pages =        "29--39",
  month =        mar # "\slash " # apr,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2005.50",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 26 18:29:12 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/30742/01423958.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=30742&arnumber=1423958&count=15&index=5",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Pfleeger:2005:CSP,
  author =       "S. L. Pfleeger and G. Bloom",
  title =        "Canning {SPAM}: Proposed solutions to unwanted email",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "3",
  number =       "2",
  pages =        "40--47",
  month =        mar # "\slash " # apr,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2005.38",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 26 18:29:12 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/30742/01423959.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=30742&arnumber=1423959&count=15&index=6",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Dodge:2005:TEU,
  author =       "R. Dodge and D. Ragsdale",
  title =        "Technology education at the {US Military Academy}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "3",
  number =       "2",
  pages =        "49--53",
  month =        mar # "\slash " # apr,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2005.52",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 26 18:29:12 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/30742/01423961.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=30742&arnumber=1423961&count=15&index=7",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Maxion:2005:MFE,
  author =       "R. A. Maxion and R. R. M. Roberts",
  title =        "Methodological foundations: enabling the next
                 generation of security",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "3",
  number =       "2",
  pages =        "54--57",
  month =        mar # "\slash " # apr,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2005.47",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 26 18:29:12 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/30742/01423962.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=30742&arnumber=1423962&count=15&index=8",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Oehlert:2005:VAF,
  author =       "P. Oehlert",
  title =        "Violating assumptions with fuzzing",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "3",
  number =       "2",
  pages =        "58--62",
  month =        mar # "\slash " # apr,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2005.55",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 26 18:29:12 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/30742/01423963.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=30742&arnumber=1423963&count=15&index=9",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Levy:2005:WPG,
  author =       "E. Levy",
  title =        "Worm propagation and generic attacks",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "3",
  number =       "2",
  pages =        "63--65",
  month =        mar # "\slash " # apr,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2005.57",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 26 18:29:12 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/30742/01423964.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=30742&arnumber=1423964&count=15&index=10",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Smith:2005:TMS,
  author =       "S. W. Smith",
  title =        "{Turing} is from {Mars}, {Shannon} is from {Venus}:
                 computer science and computer engineering",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "3",
  number =       "2",
  pages =        "66--69",
  month =        mar # "\slash " # apr,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2005.54",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 26 18:29:12 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/30742/01423965.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=30742&arnumber=1423965&count=15&index=11",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Power:2005:ASM,
  author =       "E. M. Power and R. L. Trope",
  title =        "Averting security missteps in outsourcing",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "3",
  number =       "2",
  pages =        "70--73",
  month =        mar # "\slash " # apr,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2005.36",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 26 18:29:12 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/30742/01423966.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=30742&arnumber=1423966&count=15&index=12",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Barnum:2005:KSS,
  author =       "S. Barnum and G. McGraw",
  title =        "Knowledge for software security",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "3",
  number =       "2",
  pages =        "74--78",
  month =        mar # "\slash " # apr,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2005.45",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 26 18:29:12 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/30742/01423967.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=30742&arnumber=1423967&count=15&index=13",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Geer:2005:PSP,
  author =       "D. {Geer, Jr.}",
  title =        "The Problem Statement is the Problem",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "3",
  number =       "2",
  pages =        "80--80",
  month =        mar # "\slash " # apr,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2005.53",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 26 18:29:12 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/30742/01423969.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=30742&arnumber=1423969&count=15&index=14",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Schneider:2005:IDW,
  author =       "F. B. Schneider",
  title =        "It Depends on What You Pay",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "3",
  number =       "3",
  pages =        "3--3",
  month =        may # "\slash " # jun,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2005.72",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 26 18:29:12 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/31002/01439491.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=31002&arnumber=1439491&count=20&index=0",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Stytz:2005:UB,
  author =       "M. R. Stytz",
  title =        "Under the {Black Hat}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "3",
  number =       "3",
  pages =        "5--5",
  month =        may # "\slash " # jun,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2005.83",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 26 18:29:12 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/31002/01439493.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=31002&arnumber=1439493&count=20&index=1",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{McLaughlin:2005:IHS,
  author =       "L. McLaughlin",
  title =        "Interview: Holistic Security",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "3",
  number =       "3",
  pages =        "6--8",
  month =        may # "\slash " # jun,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2005.71",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 26 18:29:12 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/31002/01439494.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=31002&arnumber=1439494&count=20&index=2",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Landau:2005:OCS,
  author =       "S. Landau and M. R. Stytz",
  title =        "Overview of cyber security: a crisis of
                 prioritization",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "3",
  number =       "3",
  pages =        "9--11",
  month =        may # "\slash " # jun,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2005.76",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 26 18:29:12 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/31002/01439495.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=31002&arnumber=1439495&count=20&index=3",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Amin:2005:GEI,
  author =       "M. Amin",
  title =        "{Guest Editor}'s Introduction: Infrastructure
                 Security--Reliability and Dependability of Critical
                 Systems",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "3",
  number =       "3",
  pages =        "15--17",
  month =        may # "\slash " # jun,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2005.68",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 26 18:29:12 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/31002/01439497.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=31002&arnumber=1439497&count=20&index=4",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Sahinoglu:2005:SMP,
  author =       "M. Sahinoglu",
  title =        "Security meter: a practical decision-tree model to
                 quantify risk",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "3",
  number =       "3",
  pages =        "18--24",
  month =        may # "\slash " # jun,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2005.81",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 26 18:29:12 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/31002/01439498.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=31002&arnumber=1439498&count=20&index=5",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Cai:2005:CIW,
  author =       "Min Cai and Kai Hwang and Yu-Kwong Kwok and Shanshan
                 Song and Yu Chen",
  title =        "Collaborative {Internet} worm containment",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "3",
  number =       "3",
  pages =        "25--33",
  month =        may # "\slash " # jun,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2005.63",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 26 18:29:12 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/31002/01439499.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=31002&arnumber=1439499&count=20&index=6",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Garfinkel:2005:RPO,
  author =       "S. L. Garfinkel and A. Juels and R. Pappu",
  title =        "{RFID} privacy: an overview of problems and proposed
                 solutions",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "3",
  number =       "3",
  pages =        "34--43",
  month =        may # "\slash " # jun,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2005.78",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 26 18:29:12 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/31002/01439500.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=31002&arnumber=1439500&count=20&index=7",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Walsh:2005:CSV,
  author =       "T. J. Walsh and D. R. Kuhn",
  title =        "Challenges in securing voice over {IP}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "3",
  number =       "3",
  pages =        "44--49",
  month =        may # "\slash " # jun,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2005.62",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 26 18:29:12 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/31002/01439501.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=31002&arnumber=1439501&count=20&index=8",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Senior:2005:EVP,
  author =       "A. Senior and S. Pankanti and A. Hampapur and L. Brown
                 and Ying-Li Tian and A. Ekin and J. Connell and Chiao
                 Fe Shu and M. Lu",
  title =        "Enabling video privacy through computer vision",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "3",
  number =       "3",
  pages =        "50--57",
  month =        may # "\slash " # jun,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2005.65",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 26 18:29:12 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/31002/01439502.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=31002&arnumber=1439502&count=20&index=9",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Donner:2005:YGF,
  author =       "M. Donner",
  title =        "A young geek's fancy turns to\ldots{} science fiction?
                 [Book recommendations]",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "3",
  number =       "3",
  pages =        "58--60",
  month =        may # "\slash " # jun,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2005.59",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 26 18:29:12 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/31002/01439503.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=31002&arnumber=1439503&count=20&index=10",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Irvine:2005:CGI,
  author =       "C. E. Irvine and M. F. Thompson and K. Allen",
  title =        "{CyberCIEGE}: gaming for information assurance",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "3",
  number =       "3",
  pages =        "61--64",
  month =        may # "\slash " # jun,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2005.64",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 26 18:29:12 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/31002/01439504.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=31002&arnumber=1439504&count=20&index=11",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Snow:2005:FWI,
  author =       "B. Snow",
  title =        "Four ways to improve security",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "3",
  number =       "3",
  pages =        "65--67",
  month =        may # "\slash " # jun,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2005.66",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 26 18:29:12 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/31002/01439505.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=31002&arnumber=1439505&count=20&index=12",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Gutmann:2005:WHC,
  author =       "P. Gutmann and D. Naccache and C. C. Palmer",
  title =        "When hashes collide [applied cryptography]",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "3",
  number =       "3",
  pages =        "68--71",
  month =        may # "\slash " # jun,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2005.84",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 26 18:29:12 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/31002/01439506.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=31002&arnumber=1439506&count=20&index=13",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Ford:2005:MMR,
  author =       "R. Ford",
  title =        "Malcode mysteries revealed [computer viruses and
                 worms]",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "3",
  number =       "3",
  pages =        "72--75",
  month =        may # "\slash " # jun,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2005.73",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 26 18:29:12 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/31002/01439507.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=31002&arnumber=1439507&count=20&index=14",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Holz:2005:SVB,
  author =       "T. Holz",
  title =        "A short visit to the bot zoo [malicious bots
                 software]",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "3",
  number =       "3",
  pages =        "76--79",
  month =        may # "\slash " # jun,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2005.58",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 26 18:29:12 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/31002/01439508.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=31002&arnumber=1439508&count=20&index=15",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Salka:2005:PLS,
  author =       "C. Salka",
  title =        "Programming languages and systems security",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "3",
  number =       "3",
  pages =        "80--83",
  month =        may # "\slash " # jun,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2005.77",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 26 18:29:12 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/31002/01439509.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=31002&arnumber=1439509&count=20&index=16",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Lesk:2005:SBF,
  author =       "M. Lesk",
  title =        "Salute the broadcast flag [digital protection for {TV}
                 recording]",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "3",
  number =       "3",
  pages =        "84--87",
  month =        may # "\slash " # jun,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2005.79",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 26 18:29:12 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/31002/01439510.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=31002&arnumber=1439510&count=20&index=17",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Taylor:2005:ASS,
  author =       "D. Taylor and G. McGraw",
  title =        "Adopting a software security improvement program",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "3",
  number =       "3",
  pages =        "88--91",
  month =        may # "\slash " # jun,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2005.60",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 26 18:29:12 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/31002/01439511.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=31002&arnumber=1439511&count=20&index=18",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Bellovin:2005:SPE,
  author =       "S. Bellovin",
  title =        "Security and Privacy: Enemies or Allies?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "3",
  number =       "3",
  pages =        "92--92",
  month =        may # "\slash " # jun,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2005.80",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 26 18:29:12 MDT 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/31002/01439512.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=31002&arnumber=1439512&count=20&index=19",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Cybenko:2005:OEM,
  author =       "George Cybenko",
  title =        "The One-Eyed Man Is King",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "3",
  number =       "4",
  pages =        "4--5",
  month =        jul # "\slash " # aug,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2005.108",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Nov 21 08:38:09 MST 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2005/04/j4004.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Paul:2005:CLV,
  author =       "Nathanael Paul",
  title =        "A Closer Look at Viruses and Worms",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "3",
  number =       "4",
  pages =        "7",
  month =        jul # "\slash " # aug,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2005.86",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Nov 21 08:38:09 MST 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2005/04/j4007.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Alfonsi:2005:AAV,
  author =       "Benjamin Alfonsi",
  title =        "Alliance Addresses {VoIP} Security",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "3",
  number =       "4",
  pages =        "8",
  month =        jul # "\slash " # aug,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2005.92",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Nov 21 08:38:09 MST 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2005/04/j4008.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Apvrille:2005:SSD,
  author =       "Axelle Apvrille and Makan Pourzandi",
  title =        "Secure Software Development by Example",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "3",
  number =       "4",
  pages =        "10--17",
  month =        jul # "\slash " # aug,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2005.103",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Nov 21 08:38:09 MST 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Ray:2005:TAA,
  author =       "Helayne T. Ray and Raghunath Vemuri and Hariprasad R.
                 Kantubhukta",
  title =        "Toward an Automated Attack Model for {Red} Teams",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "3",
  number =       "4",
  pages =        "18--25",
  month =        jul # "\slash " # aug,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2005.111",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Nov 21 08:38:09 MST 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Bailey:2005:BWT,
  author =       "Michael Bailey and Evan Cooke and Farnam Jahanian and
                 David Watson and Jose Nazario",
  title =        "The {Blaster Worm}: Then and Now",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "3",
  number =       "4",
  pages =        "26--31",
  month =        jul # "\slash " # aug,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2005.106",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Nov 21 08:38:09 MST 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Lekkas:2005:HRS,
  author =       "Dimitrios Lekkas and Diomidis Spinellis",
  title =        "Handling and Reporting Security Advisories: a
                 Scorecard Approach",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "3",
  number =       "4",
  pages =        "32--41",
  month =        jul # "\slash " # aug,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2005.98",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Nov 21 08:38:09 MST 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Gattiker:2005:E,
  author =       "Urs E. Gattiker",
  title =        "{EICAR 2005}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "3",
  number =       "4",
  pages =        "45--48",
  month =        jul # "\slash " # aug,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2005.96",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Nov 21 08:38:09 MST 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Bishop:2005:HEL,
  author =       "Matt Bishop and Deborah Frincke",
  title =        "A Human Endeavor: Lessons from {Shakespeare} and
                 Beyond",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "3",
  number =       "4",
  pages =        "49--51",
  month =        jul # "\slash " # aug,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2005.87",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Nov 21 08:38:09 MST 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Mulvenon:2005:TCS,
  author =       "James Mulvenon",
  title =        "Toward a Cyberconflict Studies Research Agenda",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "3",
  number =       "4",
  pages =        "52--55",
  month =        jul # "\slash " # aug,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2005.110",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Nov 21 08:38:09 MST 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Gutmann:2005:SU,
  author =       "Peter Gutmann and Ian Grigg",
  title =        "Security Usability",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "3",
  number =       "4",
  pages =        "56--58",
  month =        jul # "\slash " # aug,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2005.104",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Nov 21 08:38:09 MST 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Allen:2005:CF,
  author =       "William H. Allen",
  title =        "Computer Forensics",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "3",
  number =       "4",
  pages =        "59--62",
  month =        jul # "\slash " # aug,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2005.95",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Nov 21 08:38:09 MST 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Arce:2005:LB,
  author =       "Iv{\'a}n Arce",
  title =        "The Land of the Blind",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "3",
  number =       "4",
  pages =        "63--67",
  month =        jul # "\slash " # aug,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2005.107",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Nov 21 08:38:09 MST 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Sinclair:2005:TPT,
  author =       "Sara Sinclair and S. W. Smith",
  title =        "The {TIPPI} Point: Toward Trustworthy Interfaces",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "3",
  number =       "4",
  pages =        "68--71",
  month =        jul # "\slash " # aug,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2005.109",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Nov 21 08:38:09 MST 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Stytz:2005:PPP,
  author =       "Martin R. Stytz",
  title =        "Protecting Personal Privacy: Hauling Down the {Jolly
                 Roger}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "3",
  number =       "4",
  pages =        "72--74",
  month =        jul # "\slash " # aug,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2005.102",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Nov 21 08:38:09 MST 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Mead:2005:PSS,
  author =       "Nancy R. Mead and Gary McGraw",
  title =        "A Portal for Software Security",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "3",
  number =       "4",
  pages =        "75--79",
  month =        jul # "\slash " # aug,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2005.88",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Nov 21 08:38:09 MST 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Donner:2005:TAN,
  author =       "Marc Donner",
  title =        "There Ain't No Inside, There Ain't No
                 Outside\ldots{}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "3",
  number =       "5",
  pages =        "4--5",
  month =        sep # "\slash " # oct,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2005.135",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Nov 21 08:37:34 MST 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2005/05/j5004.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Webb:2005:BSS,
  author =       "Katharine W. Webb",
  title =        "Biometric Security Solutions",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "3",
  number =       "5",
  pages =        "7",
  month =        sep # "\slash " # oct,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2005.117",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Nov 21 08:37:34 MST 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2005/05/j5007.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Drinan:2005:NBa,
  author =       "Heather Drinan and Brent Kesler",
  title =        "News Briefs",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "3",
  number =       "5",
  pages =        "8--10",
  month =        sep # "\slash " # oct,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2005.130",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Nov 21 08:37:34 MST 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2005/05/j5008.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{McLaughlin:2005:AGP,
  author =       "Laurianne McLaughlin",
  title =        "From {AWK} to {Google}: {Peter Weinberger} Talks
                 Search",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "3",
  number =       "5",
  pages =        "11--13",
  month =        sep # "\slash " # oct,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2005.123",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Nov 21 08:37:34 MST 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2005/05/j5011.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Carminati:2005:EPI,
  author =       "Barbara Carminati and Elena Ferrari and Patrick C. K.
                 Hung",
  title =        "Exploring Privacy Issues in {Web} Services Discovery
                 Agencies",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "3",
  number =       "5",
  pages =        "14--21",
  month =        sep # "\slash " # oct,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2005.121",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Nov 21 08:37:34 MST 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Huberman:2005:VP,
  author =       "Bernardo A. Huberman and Eytan Adar and Leslie R.
                 Fine",
  title =        "Valuating Privacy",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "3",
  number =       "5",
  pages =        "22--25",
  month =        sep # "\slash " # oct,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2005.137",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Nov 21 08:37:34 MST 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Hoffman:2005:ENC,
  author =       "Lance J. Hoffman and Tim Rosenberg and Ronald Dodge
                 and Daniel Ragsdale",
  title =        "Exploring a National Cybersecurity Exercise for
                 Universities",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "3",
  number =       "5",
  pages =        "27--33",
  month =        sep # "\slash " # oct,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2005.120",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Nov 21 08:37:34 MST 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Schneider:2005:ITS,
  author =       "Fred B. Schneider and Lidong Zhou",
  title =        "Implementing Trustworthy Services Using Replicated
                 State Machines",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "3",
  number =       "5",
  pages =        "34--43",
  month =        sep # "\slash " # oct,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2005.125",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Nov 21 08:37:34 MST 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Reeder:2005:S,
  author =       "Robert W. Reeder and Fahd Arshad",
  title =        "Soups 2005",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "3",
  number =       "5",
  pages =        "47--50",
  month =        sep # "\slash " # oct,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2005.131",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Nov 21 08:37:34 MST 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Kuper:2005:SS,
  author =       "Peter Kuper",
  title =        "The State of Security",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "3",
  number =       "5",
  pages =        "51--53",
  month =        sep # "\slash " # oct,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2005.134",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Nov 21 08:37:34 MST 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Bishop:2005:TSP,
  author =       "Matt Bishop and Deborah A. Frincke",
  title =        "Teaching Secure Programming",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "3",
  number =       "5",
  pages =        "54--56",
  month =        sep # "\slash " # oct,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2005.133",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Nov 21 08:37:34 MST 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Miller:2005:TPC,
  author =       "Ann Miller",
  title =        "Trends in Process Control Systems Security",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "3",
  number =       "5",
  pages =        "57--60",
  month =        sep # "\slash " # oct,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2005.136",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Nov 21 08:37:34 MST 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Naccache:2005:FF,
  author =       "David Naccache",
  title =        "Finding Faults",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "3",
  number =       "5",
  pages =        "61--65",
  month =        sep # "\slash " # oct,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2005.122",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Nov 21 08:37:34 MST 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Torr:2005:DTM,
  author =       "Peter Torr",
  title =        "Demystifying the Threat-Modeling Process",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "3",
  number =       "5",
  pages =        "66--70",
  month =        sep # "\slash " # oct,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2005.119",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Nov 21 08:37:34 MST 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Nicol:2005:MSS,
  author =       "David M. Nicol",
  title =        "Modeling and Simulation in Security Evaluation",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "3",
  number =       "5",
  pages =        "71--74",
  month =        sep # "\slash " # oct,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2005.129",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Nov 21 08:37:34 MST 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{vanWyk:2005:BGB,
  author =       "Kenneth R. van Wyk and Gary McGraw",
  title =        "Bridging the Gap between Software Development and
                 Information Security",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "3",
  number =       "5",
  pages =        "75--79",
  month =        sep # "\slash " # oct,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2005.118",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Nov 21 08:37:34 MST 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Geer:2005:WPS,
  author =       "Dan Geer",
  title =        "When Is a Product a Security Product?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "3",
  number =       "5",
  pages =        "80",
  month =        sep # "\slash " # oct,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2005.138",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Nov 21 08:37:34 MST 2005",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2005/05/j5080.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Libicki:2005:RCG,
  author =       "Martin Libicki",
  title =        "Are {RFIDs} Coming to Get You?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "3",
  number =       "6",
  pages =        "6--6",
  month =        nov # "\slash " # dec,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2005.142",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Feb 9 18:53:30 MST 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/33104/01556529.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=33104&arnumber=1556529",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Drinan:2005:NBb,
  author =       "Heather Drinan and Nancy Fontaine and Brent Kesler",
  title =        "News Briefs",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "3",
  number =       "6",
  pages =        "7--8",
  month =        nov # "\slash " # dec,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2005.154",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:41 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{McLaughlin:2005:WGR,
  author =       "Laurianne McLaughlin",
  title =        "Winning the Game of Risk: {Neumann}'s Take on Sound
                 Design",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "3",
  number =       "6",
  pages =        "9--12",
  month =        nov # "\slash " # dec,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2005.164",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Feb 9 18:53:30 MST 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/33104/01556531.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=33104&arnumber=1556531",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Sherr:2005:SVW,
  author =       "Michah Sherr and Eric Cronin and Sandy Clark and Matt
                 Blaze",
  title =        "Signaling vulnerabilities in wiretapping systems",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "3",
  number =       "6",
  pages =        "13--25",
  month =        nov # "\slash " # dec,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2005.160",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Feb 9 18:53:30 MST 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/33104/01556532.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=33104&arnumber=1556532",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Landau:2005:SWI,
  author =       "Susan Landau",
  title =        "Security, wiretapping, and the {Internet}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "3",
  number =       "6",
  pages =        "26--33",
  month =        nov # "\slash " # dec,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2005.158",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Feb 9 18:53:30 MST 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/33104/01556533.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=33104&arnumber=1556533",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Campbell:2005:DSD,
  author =       "Philip L. Campbell",
  title =        "The denial-of-service dance",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "3",
  number =       "6",
  pages =        "34--40",
  month =        nov # "\slash " # dec,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2005.162",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Feb 9 18:53:30 MST 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/33104/01556534.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=33104&arnumber=1556534",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Sidiroglou:2005:CNW,
  author =       "Stelios Sidiroglou and Angelos D. Keromytis",
  title =        "Countering network worms through automatic patch
                 generation",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "3",
  number =       "6",
  pages =        "41--49",
  month =        nov # "\slash " # dec,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2005.144",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Feb 9 18:53:30 MST 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/33104/01556535.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=33104&arnumber=1556535",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Conti:2005:FCD,
  author =       "Gregory Conti and Mustaque Ahamad",
  title =        "A framework for countering denial-of-information
                 attacks",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "3",
  number =       "6",
  pages =        "50--56",
  month =        nov # "\slash " # dec,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2005.140",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Feb 9 18:53:30 MST 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/33104/01556536.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=33104&arnumber=1556536",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Keikkila:2005:SE,
  author =       "Faith M. Keikkila",
  title =        "{SecureWorld Expo 2005}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "3",
  number =       "6",
  pages =        "57--60",
  month =        nov # "\slash " # dec,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2005.156",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Feb 9 18:53:30 MST 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/33104/01556537.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=33104&arnumber=1556537",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Sheoran:2005:DSI,
  author =       "Pinny Sheoran and Oria Friesen and Barbara J. {Huffman
                 de Bel{\'o}n}",
  title =        "Developing and Sustaining Information Assurance: The
                 Role of Community Colleges (Part 1)",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "3",
  number =       "6",
  pages =        "61--63",
  month =        nov # "\slash " # dec,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2005.145",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Feb 9 18:53:30 MST 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/33104/01556538.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=33104&arnumber=1556538",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Borg:2005:ECC,
  author =       "Scott Borg",
  title =        "Economically complex cyberattacks",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "3",
  number =       "6",
  pages =        "64--67",
  month =        nov # "\slash " # dec,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2005.146",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Feb 9 18:53:30 MST 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/33104/01556539.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=33104&arnumber=1556539",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Marin:2005:NSB,
  author =       "Gerald A. Marin",
  title =        "Network security basics",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "3",
  number =       "6",
  pages =        "68--72",
  month =        nov # "\slash " # dec,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2005.153",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Feb 9 18:53:30 MST 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/33104/01556540.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=33104&arnumber=1556540",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Smith:2005:PSS,
  author =       "S. W. Smith",
  title =        "Pretending that systems are secure",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "3",
  number =       "6",
  pages =        "73--76",
  month =        nov # "\slash " # dec,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2005.155",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Feb 9 18:53:30 MST 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/33104/01556541.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=33104&arnumber=1556541",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Power:2005:ARG,
  author =       "E. Michael Power and Roland L. Trope",
  title =        "Acting responsibly with geospatial data",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "3",
  number =       "6",
  pages =        "77--80",
  month =        nov # "\slash " # dec,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2005.141",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Feb 9 18:53:30 MST 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/33104/01556542.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=33104&arnumber=1556542",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Tsipenyuk:2005:SPK,
  author =       "Katrina Tsipenyuk and Brian Chess and Gary McGraw",
  title =        "Seven pernicious kingdoms: a taxonomy of software
                 security errors",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "3",
  number =       "6",
  pages =        "81--84",
  month =        nov # "\slash " # dec,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2005.159",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Feb 9 18:53:30 MST 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/33104/01556543.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=33104&arnumber=1556543",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Phillips:2005:SSR,
  author =       "Ted Phillips and Ttom Karygiannis and Rick Kuhn",
  title =        "Security standards for the {RFID} market",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "3",
  number =       "6",
  pages =        "85--89",
  month =        nov # "\slash " # dec,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2005.157",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Feb 9 18:53:30 MST 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/33104/01556544.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=33104&arnumber=1556544",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2005:AI,
  author =       "Anonymous",
  title =        "2005 Annual Index",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "3",
  number =       "6",
  pages =        "90--95",
  month =        nov # "\slash " # dec,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2005.139",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:41 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Schneier:2005:ZS,
  author =       "Bruce Schneier",
  title =        "The {Zotob} Storm",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "3",
  number =       "6",
  pages =        "96--96",
  month =        nov # "\slash " # dec,
  year =         "2005",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2005.163",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Feb 9 18:53:30 MST 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/33104/01556546.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=33104&arnumber=1556546",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Cybenko:2006:WJC,
  author =       "George Cybenko",
  title =        "Why {Johnny} Can't Evaluate Security Risk",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "1",
  pages =        "5--5",
  month =        jan # "\slash " # feb,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.30",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Feb 9 18:53:31 MST 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/33481/01588814.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=33481&arnumber=1588814",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2006:STS,
  author =       "Anonymous",
  title =        "Special Thanks to {S\&P}'s Reviewers",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "1",
  pages =        "7--8",
  month =        jan # "\slash " # feb,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.21",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Feb 9 18:53:31 MST 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Diffie:2006:CAS,
  author =       "Whitfield Diffie",
  title =        "Chattering about {SIGINT}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "1",
  pages =        "9--9",
  month =        jan # "\slash " # feb,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.9",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Feb 9 18:53:31 MST 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/33481/01588817.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=33481&arnumber=1588817",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{McLaughlin:2006:PZW,
  author =       "Laurianne McLaughlin",
  title =        "{Philip Zimmermann} on {What's Next after PGP?}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "1",
  pages =        "10--13",
  month =        jan # "\slash " # feb,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.20",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Feb 9 18:53:31 MST 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/33481/01588818.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=33481&arnumber=1588818",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Drinan:2006:NB,
  author =       "Heather Drinan and Nancy Fontaine and Brent Kesler",
  title =        "News Briefs",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "1",
  pages =        "14--16",
  month =        jan # "\slash " # feb,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.19",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Feb 9 18:53:31 MST 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/33481/01588819.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=33481&arnumber=1588819",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Felten:2006:DRM,
  author =       "Edward W. Felten and J. Alex Halderman",
  title =        "Digital Rights Management, Spyware, and Security",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "1",
  pages =        "18--23",
  month =        jan # "\slash " # feb,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.12",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Feb 9 18:53:31 MST 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/33481/01588821.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=33481&arnumber=1588821",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Levine:2006:DCK,
  author =       "John G. Levine and Julian B. Grizzard and Henry L.
                 Owen",
  title =        "Detecting and Categorizing Kernel-Level Rootkits to
                 Aid Future Detection",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "1",
  pages =        "24--32",
  month =        jan # "\slash " # feb,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.11",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Feb 9 18:53:31 MST 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/33481/01588822.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=33481&arnumber=1588822",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Kshetri:2006:SEC,
  author =       "Nir Kshetri",
  title =        "The Simple Economics of Cybercrimes",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "1",
  pages =        "33--39",
  month =        jan # "\slash " # feb,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.27",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Feb 9 18:53:31 MST 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/33481/01588823.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=33481&arnumber=1588823",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Cheung:2006:DSA,
  author =       "Steven Cheung",
  title =        "Denial of Service against the {Domain Name System}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "1",
  pages =        "40--45",
  month =        jan # "\slash " # feb,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.10",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Feb 9 18:53:31 MST 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/33481/01588824.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=33481&arnumber=1588824",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Black:2006:SAI,
  author =       "John Black and Martin Cochran and Ryan Gardner",
  title =        "A Security Analysis of the {Internet Chess Club}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "1",
  pages =        "46--52",
  month =        jan # "\slash " # feb,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.2",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Feb 9 18:53:31 MST 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/33481/01588825.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=33481&arnumber=1588825",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Rechberger:2006:NCW,
  author =       "Christian Rechberger and Vincent Rijmen and Nicolas
                 Sklavos",
  title =        "The {NIST Cryptographic Workshop on Hash Functions}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "1",
  pages =        "54--56",
  month =        jan # "\slash " # feb,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.26",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Feb 9 18:53:31 MST 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/33481/01588827.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=33481&arnumber=1588827;
                 http://www.csrc.nist.gov/pki/HashWorkshop/",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  remark =       "October 31--November 1, 2005 Gaithersburg, MD, USA.
                 Second workshop August 24--25, 2006, Santa Barbara, CA,
                 USA.",
}

@Article{Rosenberg:2006:TNR,
  author =       "Timothy Rosenberg and Lance J. Hoffman",
  title =        "Taking Networks on the Road: Portable Solutions for
                 Security Educators",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "1",
  pages =        "57--60",
  month =        jan # "\slash " # feb,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.25",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Feb 9 18:53:31 MST 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/33481/01588828.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=33481&arnumber=1588828",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2006:EC,
  author =       "Anonymous",
  title =        "2006 Editorial Calendar",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "1",
  pages =        "61--61",
  month =        jan # "\slash " # feb,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.1",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Feb 9 18:53:31 MST 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Gligor:2006:IAT,
  author =       "Virgil D. Gligor and Tom Haigh and Dick Kemmerer and
                 Carl Landwehr and Steve Lipner and John McLean",
  title =        "Information Assurance Technology Forecast 2005",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "1",
  pages =        "62--69",
  month =        jan # "\slash " # feb,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.14",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Feb 9 18:53:31 MST 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/33481/01588830.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=33481&arnumber=1588830",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Coron:2006:WC,
  author =       "Jean-Sebastien Coron",
  title =        "What Is Cryptography?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "1",
  pages =        "70--73",
  month =        jan # "\slash " # feb,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.29",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Feb 9 18:53:31 MST 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/33481/01588831.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=33481&arnumber=1588831",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Seacord:2006:SCC,
  author =       "Robert Seacord",
  title =        "Secure Coding in {C} and {C++}: Of Strings and
                 Integers",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "1",
  pages =        "74--76",
  month =        jan # "\slash " # feb,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.22",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Feb 9 18:53:31 MST 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/33481/01588832.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=33481&arnumber=1588832",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Ruiu:2006:LIS,
  author =       "Dragos Ruiu",
  title =        "Learning from Information Security History",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "1",
  pages =        "77--79",
  month =        jan # "\slash " # feb,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.17",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Feb 9 18:53:31 MST 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/33481/01588833.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=33481&arnumber=1588833",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Epstein:2006:SSS,
  author =       "Jeremy Epstein and Scott Matsumoto and Gary McGraw",
  title =        "Software Security and {SOA}: {Danger, Will
                 Robinson}!",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "1",
  pages =        "80--83",
  month =        jan # "\slash " # feb,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.23",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Feb 9 18:53:31 MST 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/33481/01588834.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=33481&arnumber=1588834",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Chandramouli:2006:CSD,
  author =       "Ramaswamy Chandramouli and Scott Rose",
  title =        "Challenges in Securing the {Domain Name System}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "1",
  pages =        "84--87",
  month =        jan # "\slash " # feb,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.8",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Feb 9 18:53:31 MST 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/33481/01588835.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=33481&arnumber=1588835",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Bellovin:2006:UW,
  author =       "Steve Bellovin",
  title =        "Unconventional Wisdom",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "1",
  pages =        "88--88",
  month =        jan # "\slash " # feb,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.28",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Feb 9 18:53:31 MST 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://ieeexplore.ieee.org/iel5/8013/33481/01588836.pdf;
                 http://ieeexplore.ieee.org/xpls/abs_all.jsp?isnumber=33481&arnumber=1588836",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Donner:2006:ID,
  author =       "Marc Donner",
  title =        "The Impending Debate",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "2",
  pages =        "4--5",
  month =        mar # "\slash " # apr,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.55",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Apr 3 07:36:16 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2006/02/j2004.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Felker:2006:IWG,
  author =       "Mikhael Felker",
  title =        "{Internet} War Games: Power of the Masses",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "2",
  pages =        "7",
  month =        mar # "\slash " # apr,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.44",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Apr 3 07:36:16 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2006/02/j2007.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Kesler:2006:NBa,
  author =       "Brent Kesler and Heather Drinan and Nancy Fontaine",
  title =        "News Briefs",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "2",
  pages =        "8--13",
  month =        mar # "\slash " # apr,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.47",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Apr 3 07:36:16 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2006/02/j2008.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Hole:2006:CSO,
  author =       "Kjell J. Hole and Vebj{\o}rn Moen and Thomas
                 Tj{\o}stheim",
  title =        "Case Study: Online Banking Security",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "2",
  pages =        "14--20",
  month =        mar # "\slash " # apr,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.36",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Apr 3 07:36:16 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Hiltgen:2006:SIB,
  author =       "Alain Hiltgen and Thorsten Kramp and Thomas Weigold",
  title =        "Secure {Internet} Banking Authentication",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "2",
  pages =        "21--29",
  month =        mar # "\slash " # apr,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.50",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Apr 3 07:36:16 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Wang:2006:CFC,
  author =       "WenJie Wang and Yufei Yuan and Norm Archer",
  title =        "A Contextual Framework for Combating Identity Theft",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "2",
  pages =        "30--38",
  month =        mar # "\slash " # apr,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.31",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Apr 3 07:36:16 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Hwang:2006:SES,
  author =       "David D. Hwang and Patrick Schaumont and Kris Tiri and
                 Ingrid Verbauwhede",
  title =        "Securing Embedded Systems",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "2",
  pages =        "40--49",
  month =        mar # "\slash " # apr,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.51",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Apr 3 07:36:16 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Keblawi:2006:ACC,
  author =       "Feisal Keblawi and Dick Sullivan",
  title =        "Applying the Common Criteria in Systems Engineering",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "2",
  pages =        "50--55",
  month =        mar # "\slash " # apr,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.35",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Apr 3 07:36:16 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Kuper:2006:WIF,
  author =       "Peter Kuper",
  title =        "A Warning to Industry---Fix It or Lose It",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "2",
  pages =        "56--60",
  month =        mar # "\slash " # apr,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.32",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Apr 3 07:36:16 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Bishop:2006:WOY,
  author =       "Matt Bishop and Deborah A. Frincke",
  title =        "Who Owns Your Computer?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "2",
  pages =        "61--63",
  month =        mar # "\slash " # apr,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.56",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Apr 3 07:36:16 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Gennaro:2006:RC,
  author =       "Rosario Gennaro",
  title =        "Randomness in Cryptography",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "2",
  pages =        "64--67",
  month =        mar # "\slash " # apr,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.49",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Apr 3 07:36:16 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Whittaker:2006:HTA,
  author =       "James A. Whittaker and Richard Ford",
  title =        "How to Think about Security",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "2",
  pages =        "68--71",
  month =        mar # "\slash " # apr,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.39",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Apr 3 07:36:16 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Holz:2006:NTA,
  author =       "Thorsten Holz and Simon Marechal and Fr{\'e}d{\'e}ric
                 Raynal",
  title =        "New Threats and Attacks on the {World Wide Web}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "2",
  pages =        "72--75",
  month =        mar # "\slash " # apr,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.46",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Apr 3 07:36:16 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Bradner:2006:EEE,
  author =       "Scott Bradner",
  title =        "The End of End-to-End Security?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "2",
  pages =        "76--79",
  month =        mar # "\slash " # apr,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.54",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Apr 3 07:36:16 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Lesk:2006:SIF,
  author =       "Michael Lesk",
  title =        "Should Indexing Be Fair Use? {The} Battle over
                 {Google} Book Search",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "2",
  pages =        "80--83",
  month =        mar # "\slash " # apr,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.52",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Apr 3 07:36:16 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  abstract =     "In late 2004, Google announced as part of its Library
                 Project that it would scan millions of books into a
                 searchable online database accessible to anyone using
                 Google Book Search (http://books.google.com). In
                 response, the US Authors Guild and the Association of
                 American Publishers (AAP) sued Google, claiming its
                 book scanning is ``massive copyright infringement.''
                 Google says its indexing is a legitimate fair use. As
                 in all such discussions, two different questions arise:
                 What does the law say? What would be good public
                 policy?",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Steven:2006:AES,
  author =       "John Steven",
  title =        "Adopting an Enterprise Software Security Framework",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "2",
  pages =        "84--87",
  month =        mar # "\slash " # apr,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.33",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Apr 3 07:36:16 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Burr:2006:CHS,
  author =       "William E. Burr",
  title =        "Cryptographic Hash Standards: Where Do We Go from
                 Here?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "2",
  pages =        "88--91",
  month =        mar # "\slash " # apr,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.37",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Apr 3 07:36:16 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2006:ISPa,
  author =       "Anonymous",
  title =        "{IEEE Security \& Privacy} 2006 Editorial Calendar",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "2",
  pages =        "92",
  month =        mar # "\slash " # apr,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.41",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:42 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Schneider:2006:HD,
  author =       "Fred B. Schneider",
  title =        "Here Be Dragons",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "3",
  pages =        "3",
  month =        may # "\slash " # jun,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.68",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:08 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2006/03/j3003.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Pfleeger:2006:EYW,
  author =       "Shari Lawrence Pfleeger",
  title =        "Everything You Wanted to Know about Privacy (But Were
                 Afraid to Ask)",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "3",
  pages =        "5",
  month =        may # "\slash " # jun,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.65",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:08 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2006/03/j3005.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Kesler:2006:NBb,
  author =       "Brent Kesler and Heather Drinan",
  title =        "News Briefs",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "3",
  pages =        "6--10",
  month =        may # "\slash " # jun,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.76",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:08 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2006/03/j3006.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{McGraw:2006:ISBa,
  author =       "Gary McGraw",
  title =        "Interview: {Silver Bullet} Speaks to {Avi Rubin}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "3",
  pages =        "11--13",
  month =        may # "\slash " # jun,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.78",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:08 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Dempsey:2006:GEI,
  author =       "James X. Dempsey and Ira Rubinstein",
  title =        "{Guest Editors}' Introduction: Lawyers and
                 Technologists---Joined at the Hip?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "3",
  pages =        "15--19",
  month =        may # "\slash " # jun,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.67",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:08 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2006/03/j3015.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Bellia:2006:FAE,
  author =       "Patricia L. Bellia",
  title =        "The {Fourth Amendment} and Emerging Communications
                 Technologies",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "3",
  pages =        "20--28",
  month =        may # "\slash " # jun,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.80",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:08 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Gidari:2006:DRW,
  author =       "Albert Gidari",
  title =        "Designing the Right Wiretap Solution: Setting
                 Standards under {CALEA}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "3",
  pages =        "29--36",
  month =        may # "\slash " # jun,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.62",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:08 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Egan:2006:BBF,
  author =       "Erin Egan and Tim Jucovy",
  title =        "Building a Better Filter: How To Create a Safer
                 {Internet} and Avoid the Litigation Trap",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "3",
  pages =        "37--44",
  month =        may # "\slash " # jun,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.59",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:08 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Curran:2006:CSS,
  author =       "Charles D. Curran",
  title =        "Combating Spam, Spyware, and Other Desktop Intrusions:
                 Legal Considerations in Operating Trusted Intermediary
                 Technologies",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "3",
  pages =        "45--51",
  month =        may # "\slash " # jun,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.60",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:08 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Schaffer:2006:WVB,
  author =       "Gregory P. Schaffer",
  title =        "Worms and Viruses and Botnets, Oh My!: Rational
                 Responses to Emerging {Internet} Threats",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "3",
  pages =        "52--58",
  month =        may # "\slash " # jun,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.83",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:08 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Sheoran:2006:DSI,
  author =       "Pinny Sheoran and Oris Friesen and Barbara J. {Huffman
                 de Bel{\'o}n}",
  title =        "Developing and Sustaining Information Assurance: The
                 Role of Community Colleges, Part 2",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "3",
  pages =        "60--65",
  month =        may # "\slash " # jun,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.63",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:08 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Bloomfield:2006:IWG,
  author =       "Robin E. Bloomfield and Sofia Guerra and Ann Miller
                 and Marcelo Masera and Charles B. Weinstock",
  title =        "International Working Group on Assurance Cases (for
                 Security)",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "3",
  pages =        "66--68",
  month =        may # "\slash " # jun,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.73",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:08 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Paterson:2006:LTT,
  author =       "Kenneth G. Paterson and Arnold K. L. Yau",
  title =        "Lost in Translation: Theory and Practice in
                 Cryptography",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "3",
  pages =        "69--72",
  month =        may # "\slash " # jun,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.74",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:08 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Aura:2006:WYS,
  author =       "Tuomas Aura",
  title =        "Why You Shouldn't Study Security",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "3",
  pages =        "74--76",
  month =        may # "\slash " # jun,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.82",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:08 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Stytz:2006:DSS,
  author =       "Martin R. Stytz and Sheila B. Banks",
  title =        "Dynamic Software Security Testing",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "3",
  pages =        "77--79",
  month =        may # "\slash " # jun,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.64",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:08 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Chandra:2006:PTW,
  author =       "Pravir Chandra and Brian Chess and John Steven",
  title =        "Putting the Tools to Work: How to Succeed with Source
                 Code Analysis",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "3",
  pages =        "80--83",
  month =        may # "\slash " # jun,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.77",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:08 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anderson:2006:WSP,
  author =       "Anne Anderson",
  title =        "{Web} Services Policies (Abstract)",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "3",
  pages =        "84--87",
  month =        may # "\slash " # jun,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.81",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:08 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Geer:2006:CA,
  author =       "Daniel E. {Geer, Jr.}",
  title =        "Convergence (Abstract)",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "3",
  pages =        "88--88",
  month =        may # "\slash " # jun,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.61",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:08 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Landwehr:2006:SP,
  author =       "Carl E. Landwehr",
  title =        "Speaking of Privacy",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "4",
  pages =        "4--5",
  month =        jul # "\slash " # aug,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.105",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:16 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2006/04/j4004.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Kesler:2006:NBc,
  author =       "Brent Kesler and Heather Drinan",
  title =        "News Briefs",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "4",
  pages =        "6--8",
  month =        jul # "\slash " # aug,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.100",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:16 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2006/04/j4006.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Pfleeger:2006:WWW,
  author =       "Charles P. Pfleeger and Shari Lawrence Pfleeger",
  title =        "Why We Won't Review Books by Hackers",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "4",
  pages =        "9",
  month =        jul # "\slash " # aug,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.111",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:16 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2006/04/j4009.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{McGraw:2006:ISBb,
  author =       "Gary McGraw",
  title =        "Interview: {Silver Bullet} Speaks with {Dan Geer}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "4",
  pages =        "10--13",
  month =        jul # "\slash " # aug,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.104",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:16 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Andrews:2006:GEI,
  author =       "Mike Andrews",
  title =        "{Guest Editor}'s Introduction: The State of {Web}
                 Security",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "4",
  pages =        "14--15",
  month =        jul # "\slash " # aug,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.88",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:16 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2006/04/j4014.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Meier:2006:WAS,
  author =       "J. D. Meier",
  title =        "{Web} Application Security Engineering",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "4",
  pages =        "16--24",
  month =        jul # "\slash " # aug,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.109",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:16 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Viega:2006:WAS,
  author =       "John Viega and Jeremy Epstein",
  title =        "Why Applying Standards to {Web} Services Is Not
                 Enough",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "4",
  pages =        "25--31",
  month =        jul # "\slash " # aug,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.110",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:16 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Curphey:2006:WAS,
  author =       "Mark Curphey and Rudolph Araujo",
  title =        "{Web} Application Security Assessment Tools",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "4",
  pages =        "32--41",
  month =        jul # "\slash " # aug,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.108",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:16 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Verdon:2006:SPS,
  author =       "Denis Verdon",
  title =        "Security Policies and the Software Developer",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "4",
  pages =        "42--49",
  month =        jul # "\slash " # aug,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.103",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:16 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Brooks:2006:KAN,
  author =       "Richard R. Brooks and Christopher Vutsinas",
  title =        "{Kafka} in the Academy: a Note on Ethics in {IA}
                 Education",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "4",
  pages =        "50--53",
  month =        jul # "\slash " # aug,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.96",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:16 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Verissimo:2006:ITM,
  author =       "Paulo E. Ver{\'\i}ssimo and Nuno F. Neves and
                 Christian Cachin and Jonathan Poritz and David Powell
                 and Yves Deswarte and Robert Stroud and Ian Welch",
  title =        "Intrusion-Tolerant Middleware: The Road to Automatic
                 Security",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "4",
  pages =        "54--62",
  month =        jul # "\slash " # aug,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.95",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:16 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Trope:2006:LLC,
  author =       "Roland L. Trope and E. Michael Power",
  title =        "Lessons for Laptops for the {18th Century}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "4",
  pages =        "64--68",
  month =        jul # "\slash " # aug,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.97",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:16 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Rieback:2006:RMT,
  author =       "Melanie R. Rieback and Bruno Crispo and Andrew S.
                 Tanenbaum",
  title =        "{RFID} Malware: Truth vs. Myth",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "4",
  pages =        "70--72",
  month =        jul # "\slash " # aug,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.102",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:16 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Howard:2006:PPS,
  author =       "Michael Howard",
  title =        "A Process for Performing Security Code Reviews",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "4",
  pages =        "74--79",
  month =        jul # "\slash " # aug,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.84",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:16 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Arce:2006:VHV,
  author =       "Ivan Arce",
  title =        "Voices, {I} Hear Voices",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "4",
  pages =        "80--83",
  month =        jul # "\slash " # aug,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.107",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:16 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Herzog:2006:APA,
  author =       "Jonathan Herzog",
  title =        "Applying Protocol Analysis to Security Device
                 Interfaces",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "4",
  pages =        "84--87",
  month =        jul # "\slash " # aug,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.85",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:16 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Peterson:2006:IIM,
  author =       "Gunnar Peterson",
  title =        "Introduction to Identity Management Risk Metrics",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "4",
  pages =        "88--91",
  month =        jul # "\slash " # aug,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.94",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:16 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Robbins:2006:MIP,
  author =       "Jim Robbins and John T. Sabo",
  title =        "Managing Information Privacy: Developing a Context for
                 Security and Privacy Standards Convergence",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "4",
  pages =        "92--95",
  month =        jul # "\slash " # aug,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.98",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:16 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Bellovin:2006:BSI,
  author =       "Steven M. Bellovin",
  title =        "On the Brittleness of Software and the Infeasibility
                 of Security Metrics",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "4",
  pages =        "96--96",
  month =        jul # "\slash " # aug,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.101",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:16 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Donner:2006:ITO,
  author =       "Marc Donner",
  title =        "Insecurity through Obscurity",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "5",
  pages =        "4",
  month =        sep # "\slash " # oct,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.123",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:29 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2006/05/j5004.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2006:LE,
  author =       "Anonymous",
  title =        "Letters to the Editor",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "5",
  pages =        "5",
  month =        sep # "\slash " # oct,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.127",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:29 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2006/05/j5005.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{MacDonald:2006:CBT,
  author =       "Geraldine MacDonald",
  title =        "Cross-Border Transaction Liability",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "5",
  pages =        "7",
  month =        sep # "\slash " # oct,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.116",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:29 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2006/05/j5007.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Ortega:2006:NBa,
  author =       "Brandi Ortega",
  title =        "News Briefs",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "5",
  pages =        "8--10",
  month =        sep # "\slash " # oct,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.129",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:29 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2006/05/j5008.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{McGraw:2006:ISBc,
  author =       "Gary McGraw",
  title =        "Interview: {Silver Bullet} Speaks to {Marcus Ranum}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "5",
  pages =        "11--14",
  month =        sep # "\slash " # oct,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.126",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:29 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Geiger:2006:SSD,
  author =       "Matthew Geiger and Lorrie Faith Cranor",
  title =        "Scrubbing Stubborn Data: An Evaluation of
                 Counter-Forensic Privacy Tools",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "5",
  pages =        "16--25",
  month =        sep # "\slash " # oct,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.132",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:29 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Thibadeau:2006:TCD,
  author =       "Robert Thibadeau",
  title =        "Trusted Computing for Disk Drives and Other
                 Peripherals",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "5",
  pages =        "26--33",
  month =        sep # "\slash " # oct,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.136",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:29 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Shaunghe:2006:EPS,
  author =       "Peng Shaunghe and Han Zhen",
  title =        "Enhancing {PC} Security with a {U}-Key",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "5",
  pages =        "34--39",
  month =        sep # "\slash " # oct,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.118",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:29 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Jacoby:2006:UBC,
  author =       "Grant A. Jacoby and Randy Marchany and Nathaniel J.
                 {Davis IV}",
  title =        "Using Battery Constraints within Mobile Hosts to
                 Improve Network Security",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "5",
  pages =        "40--49",
  month =        sep # "\slash " # oct,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.139",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:29 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Randell:2006:VTT,
  author =       "Brian Randell and Peter Y. A. Ryan",
  title =        "Voting Technologies and Trust",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "5",
  pages =        "50--56",
  month =        sep # "\slash " # oct,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.140",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:29 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Weis:2006:PET,
  author =       "Stephen A. Weis",
  title =        "Privacy Enhancing Technologies",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "5",
  pages =        "59",
  month =        sep # "\slash " # oct,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.130",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:29 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2006/05/j5059.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Slay:2006:CSE,
  author =       "Jill Slay and Benjamin Turnbull",
  title =        "Computer Security Education and Research in
                 {Australia}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "5",
  pages =        "60--63",
  month =        sep # "\slash " # oct,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.115",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:29 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Martin:2006:FSP,
  author =       "Luther Martin",
  title =        "Fitting Square Pegs into Round Holes",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "5",
  pages =        "64--66",
  month =        sep # "\slash " # oct,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.120",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:29 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Gordon:2006:UAV,
  author =       "Sarah Gordon",
  title =        "Understanding the Adversary: Virus Writers and
                 Beyond",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "5",
  pages =        "67--70",
  month =        sep # "\slash " # oct,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.137",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:29 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Levy:2006:WCS,
  author =       "Elias Levy",
  title =        "Worst-Case Scenario",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "5",
  pages =        "71--73",
  month =        sep # "\slash " # oct,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.141",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:29 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Trope:2006:ITM,
  author =       "Roland L. Trope",
  title =        "Immaterial Transfers with Material Consequences",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "5",
  pages =        "74--78",
  month =        sep # "\slash " # oct,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.122",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:29 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{vanWyk:2006:EFS,
  author =       "Kenneth R. van Wyk and John Steven",
  title =        "Essential Factors for Successful Software Security
                 Awareness Training",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "5",
  pages =        "80--83",
  month =        sep # "\slash " # oct,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.119",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:29 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Montgomery:2006:TSR,
  author =       "Doug Montgomery and Sandra Murphy",
  title =        "Toward Secure Routing Infrastructures",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "5",
  pages =        "84--87",
  month =        sep # "\slash " # oct,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.135",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:29 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Schneier:2006:UND,
  author =       "Bruce Schneier",
  title =        "University Networks and Data Security",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "5",
  pages =        "88--88",
  month =        sep # "\slash " # oct,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.138",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Oct 24 17:28:29 MDT 2006",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Cybenko:2006:WLS,
  author =       "George Cybenko",
  title =        "Weak Links, Strong Ties",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "6",
  pages =        "3",
  month =        nov # "\slash " # dec,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.170",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:42 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2006:M,
  author =       "Anonymous",
  title =        "Masthead",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "6",
  pages =        "4",
  month =        nov # "\slash " # dec,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.158",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:42 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Spafford:2006:DIB,
  author =       "Eugene Spafford",
  title =        "Desert Island Books",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "6",
  pages =        "5",
  month =        nov # "\slash " # dec,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.150",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:42 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Ortega:2006:NBb,
  author =       "Brandi Ortega",
  title =        "News Briefs",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "6",
  pages =        "6--9",
  month =        nov # "\slash " # dec,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.160",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:42 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{McGraw:2006:SBS,
  author =       "Gary McGraw",
  title =        "Silver Bullet Speaks with {Ed Felten}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "6",
  pages =        "10--13",
  month =        nov # "\slash " # dec,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.164",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:42 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2006:RC,
  author =       "Anonymous",
  title =        "{RSA{\reg} Conference 2007}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "6",
  pages =        "14",
  month =        nov # "\slash " # dec,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.162",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:42 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Garfinkel:2006:GEI,
  author =       "Simson Garfinkel and Michael D. Smith",
  title =        "{Guest Editors}' Introduction: Data Surveillance",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "6",
  pages =        "15--17",
  month =        nov # "\slash " # dec,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.154",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:42 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Popp:2006:CTT,
  author =       "Robert Popp and John Poindexter",
  title =        "Countering Terrorism through Information and Privacy
                 Protection Technologies",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "6",
  pages =        "18--27",
  month =        nov # "\slash " # dec,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.147",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:42 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Jonas:2006:TFI,
  author =       "Jeff Jonas",
  title =        "Threat and Fraud Intelligence, {Las Vegas} Style",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "6",
  pages =        "28--34",
  month =        nov # "\slash " # dec,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.169",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:42 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2006:ICS,
  author =       "Anonymous",
  title =        "{IEEE Computer Society Distance Learning Campus}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "6",
  pages =        "35",
  month =        nov # "\slash " # dec,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.155",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:42 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Chaboya:2006:NID,
  author =       "David J. Chaboya and Richard A. Raines and Rusty O.
                 Baldwin and Barry E. Mullins",
  title =        "Network Intrusion Detection: Automated and Manual
                 Methods Prone to Attack and Evasion",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "6",
  pages =        "36--43",
  month =        nov # "\slash " # dec,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.159",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:42 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Lee:2006:EPI,
  author =       "Vincent C. S. Lee and Linyi Shao",
  title =        "Estimating Potential {IT} Security Losses: An
                 Alternative Quantitative Approach",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "6",
  pages =        "44--52",
  month =        nov # "\slash " # dec,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.151",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:42 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Tsai:2006:S,
  author =       "Janice Y. Tsai and Serge Egelman",
  title =        "{Soups 2006}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "6",
  pages =        "53--55",
  month =        nov # "\slash " # dec,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.165",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:42 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Rubin:2006:CSE,
  author =       "Bradley S. Rubin and Donald Cheung",
  title =        "Computer Security Education and Research: Handle with
                 Care",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "6",
  pages =        "56--59",
  month =        nov # "\slash " # dec,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.146",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:42 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Porras:2006:PEG,
  author =       "Phillip A. Porras",
  title =        "Privacy-Enabled Global Threat Monitoring",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "6",
  pages =        "60--63",
  month =        nov # "\slash " # dec,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.161",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:42 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Tomaszewski:2006:YSY,
  author =       "John P. Tomaszewski",
  title =        "Are You Sure You Had a Privacy Incident?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "6",
  pages =        "64--66",
  month =        nov # "\slash " # dec,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.143",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:42 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Gratzer:2006:CLE,
  author =       "Vanessa Gratzer and David Naccache",
  title =        "Cryptography, Law Enforcement, and Mobile
                 Communications",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "6",
  pages =        "67--70",
  month =        nov # "\slash " # dec,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.148",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:42 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Ladd:2006:SPS,
  author =       "David Ladd",
  title =        "A Software Procurement and Security Primer",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "6",
  pages =        "71--73",
  month =        nov # "\slash " # dec,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.142",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:42 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Kiely:2006:SSM,
  author =       "Laree Kiely and Terry V. Benzel",
  title =        "Systemic Security Management",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "6",
  pages =        "74--77",
  month =        nov # "\slash " # dec,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.167",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:42 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Suchan:2006:SWL,
  author =       "William Suchan and Edward Sobiesk",
  title =        "Strengthening the Weakest Link in Digital Protection",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "6",
  pages =        "78--80",
  month =        nov # "\slash " # dec,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.166",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:42 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Peterson:2006:DMW,
  author =       "Gunnar Peterson and John Steven",
  title =        "Defining Misuse within the Development Process",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "6",
  pages =        "81--84",
  month =        nov # "\slash " # dec,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.149",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:42 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Mell:2006:CVS,
  author =       "Peter Mell and Karen Scarfone and Sasha Romanosky",
  title =        "Common Vulnerability Scoring System",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "6",
  pages =        "85--89",
  month =        nov # "\slash " # dec,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.145",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:42 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2006:ISPb,
  author =       "Anonymous",
  title =        "{IEEE Security \& Privacy} 2006 Annual Index, Volume
                 4",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "6",
  pages =        "90--95",
  month =        nov # "\slash " # dec,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.156",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:42 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Geer:2006:EE,
  author =       "Daniel E. {Geer, Jr.}",
  title =        "Evidently Evidentiary",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "4",
  number =       "6",
  pages =        "96",
  month =        nov # "\slash " # dec,
  year =         "2006",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2006.152",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:42 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Landwehr:2007:NCN,
  author =       "Carl E. Landwehr",
  title =        "New Challenges for the {New Year}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "1",
  pages =        "3--4",
  month =        jan # "\slash " # feb,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.13",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:43 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2007:STS,
  author =       "Anonymous",
  title =        "Special Thanks to {S\&P}'s Reviewers",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "1",
  pages =        "6--7",
  month =        jan # "\slash " # feb,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.19",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:43 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anderson:2007:SSS,
  author =       "Ross Anderson",
  title =        "Software Security: State of the Art",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "1",
  pages =        "8",
  month =        jan # "\slash " # feb,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.18",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:43 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{McGraw:2007:SBSa,
  author =       "Gary McGraw",
  title =        "Silver Bullet Speaks with {John Stewart}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "1",
  pages =        "9--11",
  month =        jan # "\slash " # feb,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.17",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:43 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Ortega:2007:NBa,
  author =       "Brandi Ortega",
  title =        "News Briefs",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "1",
  pages =        "12--15",
  month =        jan # "\slash " # feb,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.14",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:43 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Oppliger:2007:PCM,
  author =       "Rolf Oppliger",
  title =        "Providing Certified Mail Services on the {Internet}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "1",
  pages =        "16--22",
  month =        jan # "\slash " # feb,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.15",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:43 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Aime:2007:DWN,
  author =       "Marco Domenico Aime and Giorgio Calandriello and
                 Antonio Lioy",
  title =        "Dependability in Wireless Networks: Can We Rely on
                 {WiFi?}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "1",
  pages =        "23--29",
  month =        jan # "\slash " # feb,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.4",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:43 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Woody:2007:COS,
  author =       "Carol Woody and Christopher Alberts",
  title =        "Considering Operational Security Risk during System
                 Development",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "1",
  pages =        "30--35",
  month =        jan # "\slash " # feb,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.3",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:43 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Baker:2007:ISU,
  author =       "Wade H. Baker and Linda Wallace",
  title =        "Is Information Security Under Control?: Investigating
                 Quality in Information Security Management",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "1",
  pages =        "36--44",
  month =        jan # "\slash " # feb,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.11",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:43 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anton:2007:HEW,
  author =       "Annie I. Ant{\'o}n and Julia B. Eart and Matthew W.
                 Vail and Neha Jain and Carrie M. Gheen and Jack M.
                 Frink",
  title =        "{HIPAA}'s Effect on {Web} Site Privacy Policies",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "1",
  pages =        "45--52",
  month =        jan # "\slash " # feb,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.7",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:43 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Bishop:2007:ALO,
  author =       "Matt Bishop and Deborah A. Frincke",
  title =        "Achieving Learning Objectives through {E}-Voting Case
                 Studies",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "1",
  pages =        "53--56",
  month =        jan # "\slash " # feb,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.1",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:43 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Iyer:2007:TAA,
  author =       "Ravishankar K. Iyer and Zbigniew Kalbarczyk and
                 Karthik Pattabiraman and William Healey and Wen-Mei W.
                 Hwu and Peter Klemperer and Reza Farivar",
  title =        "Toward Application-Aware Security and Reliability",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "1",
  pages =        "57--62",
  month =        jan # "\slash " # feb,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.23",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:43 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Geiselmann:2007:SPH,
  author =       "Willi Geiselmann and Rainer Steinwandt",
  title =        "Special-Purpose Hardware in Cryptanalysis: The Case of
                 1,024-Bit {RSA}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "1",
  pages =        "63--66",
  month =        jan # "\slash " # feb,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.20",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:43 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Ford:2007:HS,
  author =       "Richard Ford and William H. Allen",
  title =        "How Not to Be Seen",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "1",
  pages =        "67--69",
  month =        jan # "\slash " # feb,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.8",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:43 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{ODonnell:2007:EMS,
  author =       "Adam J. O'Donnell",
  title =        "The Evolutionary Microcosm of Stock Spam",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "1",
  pages =        "70--72",
  month =        jan # "\slash " # feb,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.22",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:43 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{DeLooze:2007:PWS,
  author =       "Lori DeLooze",
  title =        "Providing {Web} Service Security in a Federated
                 Environment",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "1",
  pages =        "73--75",
  month =        jan # "\slash " # feb,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.16",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:43 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Morris:2007:WWY,
  author =       "John Morris and Jon Peterson",
  title =        "Who's Watching You Now?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "1",
  pages =        "76--79",
  month =        jan # "\slash " # feb,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.24",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:43 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Bellovin:2007:DCC,
  author =       "Steve Bellovin",
  title =        "{DRM}, Complexity, and Correctness",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "1",
  pages =        "80",
  month =        jan # "\slash " # feb,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.5",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:43 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Schneider:2007:TCC,
  author =       "Fred Schneider",
  title =        "Trusted Computing in Context",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "2",
  pages =        "4--5",
  month =        mar # "\slash " # apr,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.47",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:43 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Ortega:2007:NBb,
  author =       "Brandi Ortega",
  title =        "News Briefs",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "2",
  pages =        "7--10",
  month =        mar # "\slash " # apr,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.38",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:43 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{McGraw:2007:SBSb,
  author =       "Gary McGraw",
  title =        "Silver Bullet Speaks with {Dorothy Denning}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "2",
  pages =        "11--14",
  month =        mar # "\slash " # apr,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.41",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:43 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Arce:2007:SPY,
  author =       "Iv{\'a}n Arce",
  title =        "A Surprise Party (on Your Computer)?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "2",
  pages =        "15--16",
  month =        mar # "\slash " # apr,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.27",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:43 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Carettoni:2007:SBM,
  author =       "Luca Carettoni and Claudio Merloni and Stefano
                 Zanero",
  title =        "Studying {Bluetooth} Malware Propagation: The
                 {BlueBag} Project",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "2",
  pages =        "17--25",
  month =        mar # "\slash " # apr,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.43",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:43 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Gratzer:2007:AVQ,
  author =       "Vanessa Gratzer and David Naccache",
  title =        "Alien vs. {Quine}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "2",
  pages =        "26--31",
  month =        mar # "\slash " # apr,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.28",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:43 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Willems:2007:TAD,
  author =       "Carsten Willems and Thorsten Holz and Felix Freiling",
  title =        "Toward Automated Dynamic Malware Analysis Using
                 {CWSandbox}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "2",
  pages =        "32--39",
  month =        mar # "\slash " # apr,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.45",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:43 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Lyda:2007:UEA,
  author =       "Robert Lyda and James Hamrock",
  title =        "Using Entropy Analysis to Find Encrypted and Packed
                 Malware",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "2",
  pages =        "40--45",
  month =        mar # "\slash " # apr,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.48",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:43 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Bruschi:2007:CNS,
  author =       "Danilo Bruschi and Lorenzo Martignoni and Mattia
                 Monga",
  title =        "Code Normalization for Self-Mutating Malware",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "2",
  pages =        "46--54",
  month =        mar # "\slash " # apr,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.31",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:43 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Bhargav-Spantzel:2007:TNI,
  author =       "Abhilasha Bhargav-Spantzel and Anna C. Squicciarini
                 and Elisa Bertino",
  title =        "Trust Negotiation in Identity Management",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "2",
  pages =        "55--63",
  month =        mar # "\slash " # apr,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.46",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:43 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Theoharidou:2007:CBK,
  author =       "Marianthi Theoharidou and Dimitris Gritazalis",
  title =        "Common Body of Knowledge for Information Security",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "2",
  pages =        "64--67",
  month =        mar # "\slash " # apr,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.32",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:43 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Martin:2007:SCE,
  author =       "Keye Martin",
  title =        "Secure Communication without Encryption?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "2",
  pages =        "68--71",
  month =        mar # "\slash " # apr,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.39",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:43 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Power:2007:SBB,
  author =       "E. Michael Power and Jonathan Gilhen and Roland L.
                 Trope",
  title =        "Setting Boundaries at Borders: Reconciling Laptop
                 Searches and Privacy",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "2",
  pages =        "72--75",
  month =        mar # "\slash " # apr,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.40",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:43 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Tsang:2007:WCT,
  author =       "Patrick P. Tsang",
  title =        "When Cryptographers Turn Lead into Gold",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "2",
  pages =        "76--79",
  month =        mar # "\slash " # apr,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.49",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:43 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Kapadia:2007:CSU,
  author =       "Apu Kapadia",
  title =        "A Case (Study) For Usability in Secure Email
                 Communication",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "2",
  pages =        "80--84",
  month =        mar # "\slash " # apr,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.25",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:43 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Lesk:2007:SKW,
  author =       "Michael Lesk",
  title =        "{South Korea}'s Way to the Future",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "2",
  pages =        "85--87",
  month =        mar # "\slash " # apr,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.42",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:43 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Nichols:2007:MFD,
  author =       "Elizabeth A. Nichols and Gunnar Peterson",
  title =        "A Metrics Framework to Drive Application Security
                 Improvement",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "2",
  pages =        "88--91",
  month =        mar # "\slash " # apr,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.26",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:43 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Chandramouli:2007:ISS,
  author =       "Ramaswamy Chandramouli and Philip Lee",
  title =        "Infrastructure Standards for Smart {ID} Card
                 Deployment",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "2",
  pages =        "92--96",
  month =        mar # "\slash " # apr,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.34",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:43 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Landwehr:2007:FTI,
  author =       "Carl E. Landwehr",
  title =        "Food for Thought: Improving the Market for Assurance",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "3",
  pages =        "3--4",
  month =        may # "\slash " # jun,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.60",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:44 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{McGraw:2007:SBTa,
  author =       "Gary McGraw",
  title =        "Silver Bullet Talks with {Becky Bace}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "3",
  pages =        "6--9",
  month =        may # "\slash " # jun,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.70",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:44 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Ortega:2007:NBc,
  author =       "Brandi Ortega",
  title =        "News Briefs",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "3",
  pages =        "10--12",
  month =        may # "\slash " # jun,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.67",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:44 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Pfleeger:2007:GEI,
  author =       "Shari Lawrence Pfleeger and Roland L. Trope and
                 Charles C. Palmer",
  title =        "{Guest Editors}' Introduction: Managing Organizational
                 Security",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "3",
  pages =        "13--15",
  month =        may # "\slash " # jun,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.62",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:44 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Johnson:2007:EIS,
  author =       "M. Eric Johnson and Eric Goetz",
  title =        "Embedding Information Security into the Organization",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "3",
  pages =        "16--24",
  month =        may # "\slash " # jun,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.59",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:44 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Pfleeger:2007:IBC,
  author =       "Shari Lawrence Pfleeger and Martin Libicki and Michael
                 Webber",
  title =        "{I}'ll Buy That! Cybersecurity in the {Internet}
                 Marketplace",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "3",
  pages =        "25--31",
  month =        may # "\slash " # jun,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.64",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:44 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Trope:2007:CSD,
  author =       "Roland L. Trope and E. Michael Power and Vincent I.
                 Polley and Bradford C. Morley",
  title =        "A Coherent Strategy for Data Security through Data
                 Governance",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "3",
  pages =        "32--39",
  month =        may # "\slash " # jun,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.51",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:44 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Rosenblum:2007:WAC,
  author =       "David Rosenblum",
  title =        "What Anyone Can Know: The Privacy Risks of Social
                 Networking Sites",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "3",
  pages =        "40--49",
  month =        may # "\slash " # jun,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.75",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:44 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Baer:2007:CIS,
  author =       "Walter S. Baer and Andrew Parkinson",
  title =        "Cyberinsurance in {IT} Security Management",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "3",
  pages =        "50--56",
  month =        may # "\slash " # jun,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.57",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:44 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Swart:2007:ESC,
  author =       "Richard S. Swart and Robert F. Erbacher",
  title =        "Educating Students to Create Trustworthy Systems",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "3",
  pages =        "58--61",
  month =        may # "\slash " # jun,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.58",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:44 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Carpenter:2007:HVA,
  author =       "Matthew Carpenter and Tom Liston and Ed Skoudis",
  title =        "Hiding Virtualization from Attackers and Malware",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "3",
  pages =        "62--65",
  month =        may # "\slash " # jun,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.63",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:44 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Sobiesk:2007:CFW,
  author =       "Edward Sobiesk and Gregory Conti",
  title =        "The Cost of Free {Web} Tools",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "3",
  pages =        "66--68",
  month =        may # "\slash " # jun,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.74",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:44 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Lysyanskaya:2007:AI,
  author =       "Anna Lysyanskaya",
  title =        "Authentication without Identification",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "3",
  pages =        "69--71",
  month =        may # "\slash " # jun,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.52",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:44 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Knutson:2007:BPS,
  author =       "Tina R. Knutson",
  title =        "Building Privacy into Software Products and Services",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "3",
  pages =        "72--74",
  month =        may # "\slash " # jun,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.55",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:44 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Ahmad:2007:CSS,
  author =       "David Ahmad",
  title =        "The Contemporary Software Security Landscape",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "3",
  pages =        "75--77",
  month =        may # "\slash " # jun,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.73",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:44 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Sasse:2007:REB,
  author =       "M. Angela Sasse",
  title =        "Red-Eye Blink, Bendy Shuffle, and the Yuck Factor: a
                 User Experience of Biometric Airport Systems",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "3",
  pages =        "78--81",
  month =        may # "\slash " # jun,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.69",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:44 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Gagnon:2007:SPT,
  author =       "Michael N. Gagnon and Stephen Taylor and Anup K.
                 Ghosh",
  title =        "Software Protection through Anti-Debugging",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "3",
  pages =        "82--84",
  month =        may # "\slash " # jun,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.71",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:44 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Peeters:2007:CES,
  author =       "Johan Peeters and Paul Dyson",
  title =        "Cost-Effective Security",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "3",
  pages =        "85--87",
  month =        may # "\slash " # jun,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.56",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:44 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Schneier:2007:NCS,
  author =       "Bruce Schneier",
  title =        "Nonsecurity Considerations in Security Decisions",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "3",
  pages =        "88",
  month =        may # "\slash " # jun,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.68",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:44 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Donner:2007:CE,
  author =       "Marc Donner",
  title =        "Cyberassault on {Estonia}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "4",
  pages =        "4",
  month =        jul # "\slash " # aug,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.78",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:45 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Ortega:2007:NBd,
  author =       "Brandi Ortega",
  title =        "News Briefs",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "4",
  pages =        "6--9",
  month =        jul # "\slash " # aug,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.93",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:45 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{McGraw:2007:SBTb,
  author =       "Gary McGraw and Ross Anderson",
  title =        "Silver Bullet Talks with {Ross Anderson}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "4",
  pages =        "10--13",
  month =        jul # "\slash " # aug,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.94",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:45 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{English:2007:MAC,
  author =       "Jennifer English and David Coe and Rhonda Gaede and
                 David Hyde and Jeffrey Kulick",
  title =        "{MEMS}-Assisted Cryptography for {CPI} Protection",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "4",
  pages =        "14--21",
  month =        jul # "\slash " # aug,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.90",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:45 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Heikkila:2007:ESC,
  author =       "Faith M. Heikkila",
  title =        "Encryption: Security Considerations for Portable Media
                 Devices",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "4",
  pages =        "22--27",
  month =        jul # "\slash " # aug,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.80",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:45 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Jones:2007:ESV,
  author =       "Jeffrey R. Jones",
  title =        "Estimating Software Vulnerabilities",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "4",
  pages =        "28--32",
  month =        jul # "\slash " # aug,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.81",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:45 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Kim:2007:SFD,
  author =       "Jangbok Kim and Kihyun Chung and Kyunghee Choi",
  title =        "Spam Filtering With Dynamically Updated {URL}
                 Statistics",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "4",
  pages =        "33--39",
  month =        jul # "\slash " # aug,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.95",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:45 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Dimitriadis:2007:IMC,
  author =       "Christos K. Dimitriadis",
  title =        "Improving Mobile Core Network Security with
                 Honeynets",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "4",
  pages =        "40--47",
  month =        jul # "\slash " # aug,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.85",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:45 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Peisert:2007:SP,
  author =       "Sean Peisert and Matt Bishop",
  title =        "{I} Am a Scientist, Not a Philosopher!",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "4",
  pages =        "48--51",
  month =        jul # "\slash " # aug,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.84",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:45 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Franz:2007:CUT,
  author =       "Michael Franz",
  title =        "Containing the Ultimate {Trojan} Horse",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "4",
  pages =        "52--56",
  month =        jul # "\slash " # aug,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.77",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:45 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{IntVeld:2007:DSA,
  author =       "Sophie {In 't Veld}",
  title =        "Data Sharing across the {Atlantic}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "4",
  pages =        "58--61",
  month =        jul # "\slash " # aug,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.79",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:45 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Aciicmez:2007:MAC,
  author =       "Onur Acii{\c{c}}mez and Jean-Pierre Seifert and
                 {\c{C}}etin Kaya Ko{\c{c}}",
  title =        "Micro-Architectural Cryptanalysis",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "4",
  pages =        "62--64",
  month =        jul # "\slash " # aug,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.91",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:45 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Allen:2007:MWC,
  author =       "William H. Allen",
  title =        "Mixing Wheat with the Chaff: Creating Useful Test Data
                 for {IDS} Evaluation",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "4",
  pages =        "65--67",
  month =        jul # "\slash " # aug,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.92",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:45 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Arce:2007:GVM,
  author =       "Iv{\'a}n Arce",
  title =        "Ghost in the Virtual Machine",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "4",
  pages =        "68--71",
  month =        jul # "\slash " # aug,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.83",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:45 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  abstract =     "Virtual machines and virtualization technologies
                 aren't new to the computing world---they've been used
                 for at least 40 years. Recently, the availability of
                 virtualization software for low-cost computer equipment
                 and the promise of both tangible reductions on total
                 cost of ownership and rapid return on investment on
                 virtualization projects have moved many organizations
                 to adopt it as a key component of their IT strategy. In
                 this installment of Attack Trends, I'll look at this
                 technology trend with an eye toward security and
                 analyze past and present advances in offensive security
                 tools and techniques",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Bratus:2007:WHL,
  author =       "Sergey Bratus",
  title =        "What Hackers Learn that the Rest of Us Don't: Notes on
                 Hacker Curriculum",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "4",
  pages =        "72--75",
  month =        jul # "\slash " # aug,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.101",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:45 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Lesk:2007:NFL,
  author =       "Michael Lesk",
  title =        "The New Front Line: {Estonia} under Cyberassault",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "4",
  pages =        "76--79",
  month =        jul # "\slash " # aug,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.98",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:45 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Gupta:2007:UAG,
  author =       "Suvajit Gupta and Joel Winstead",
  title =        "Using Attack Graphs to Design Systems",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "4",
  pages =        "80--83",
  month =        jul # "\slash " # aug,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.100",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:45 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Bramhall:2007:UCI,
  author =       "Pete Bramhall and Marit Hansen and Kai Rannenberg and
                 Thomas Roessler",
  title =        "User-Centric Identity Management: New Trends in
                 Standardization and Regulation",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "4",
  pages =        "84--87",
  month =        jul # "\slash " # aug,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.99",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:45 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Geer:2007:EBW,
  author =       "Daniel E. Geer",
  title =        "The End of Black and White",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "4",
  pages =        "88",
  month =        jul # "\slash " # aug,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.97",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Aug 2 17:50:45 MDT 2007",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Schneider:2007:TSP,
  author =       "Fred B. Schneider",
  title =        "Technology Scapegoats and Policy Saviors",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "5",
  pages =        "3--4",
  month =        sep # "\slash " # oct,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.124",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:37 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2007/05/msp2007050003.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2007:I,
  author =       "Anonymous",
  title =        "Interface",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "5",
  pages =        "5",
  month =        sep # "\slash " # oct,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.113",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:37 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2007/05/msp2007050005.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Pfleeger:2007:SL,
  author =       "Shari Lawrence Pfleeger",
  title =        "Spooky Lessons",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "5",
  pages =        "7",
  month =        sep # "\slash " # oct,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.122",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:37 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2007/05/msp2007050007.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{McGraw:2007:ISBa,
  author =       "Gary McGraw",
  title =        "Interview: {Silver Bullet} Talks with {Annie
                 Ant{\'o}n}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "5",
  pages =        "8--11",
  month =        sep # "\slash " # oct,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.121",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:37 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Ortega:2007:NBe,
  author =       "Brandi Ortega",
  title =        "News Briefs",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "5",
  pages =        "12--14",
  month =        sep # "\slash " # oct,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.115",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:37 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2007/05/msp2007050012.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Otto:2007:CDH,
  author =       "Paul N. Otto and Annie I. Ant{\'o}n and David L.
                 Baumer",
  title =        "The {ChoicePoint} Dilemma: How Data Brokers Should
                 Handle the Privacy of Personal Information",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "5",
  pages =        "15--23",
  month =        sep # "\slash " # oct,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.126",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:37 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Vassilev:2007:PBW,
  author =       "Apostol T. Vassilev and Bertrand du Castel and Asad M.
                 Ali",
  title =        "Personal Brokerage of {Web} Service Access",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "5",
  pages =        "24--31",
  month =        sep # "\slash " # oct,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.118",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:37 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Mabry:2007:USE,
  author =       "Frank J. Mabry and John R. James and Aaron J.
                 Ferguson",
  title =        "{Unicode} Steganographic Exploits: Maintaining
                 Enterprise Border Security",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "5",
  pages =        "32--39",
  month =        sep # "\slash " # oct,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.128",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:37 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  abstract =     "Unicode is rapidly becoming the preferred means for
                 representing symbols used in creating multimedia
                 content, especially for information that's presented in
                 multiple languages. This article discusses a Unicode
                 vulnerability that makes such content susceptible to
                 being used for creation of covert channel
                 communications. We also developed a solution
                 architecture, the Unified Secure Message Augmentation
                 (USMA) service. The USMA service incorporates rules (in
                 an XML vocabulary) that we can apply to Unicode
                 transmissions that will detect an attempt to transmit a
                 potential exploit, alert network managers to the
                 presence of the Unicode anomaly, and take action to
                 mitigate the exploit.",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Mullins:2007:HCD,
  author =       "Barry E. Mullins and Timothy H. Lacey and Robert F.
                 Mills and Joseph E. Trechter and Samuel D. Bass",
  title =        "How the Cyber Defense Exercise Shaped an
                 Information-Assurance Curriculum",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "5",
  pages =        "40--49",
  month =        sep # "\slash " # oct,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.111",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:37 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Oshri:2007:ISS,
  author =       "Ilan Oshri and Julia Kotlarsky and Corey Hirsch",
  title =        "An Information Security Strategy for Networkable
                 Devices",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "5",
  pages =        "50--56",
  month =        sep # "\slash " # oct,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.104",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:37 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Caulkins:2007:OIS,
  author =       "Jonathan Caulkins and Eric D. Hough and Nancy R. Mead
                 and Hassan Osman",
  title =        "Optimizing Investments in Security Countermeasures: a
                 Practical Tool for Fixed Budgets",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "5",
  pages =        "57--60",
  month =        sep # "\slash " # oct,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.117",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:37 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Ryan:2007:PGE,
  author =       "Julie J. C. H. Ryan",
  title =        "Plagiarism, Graduate Education, and Information
                 Security",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "5",
  pages =        "62--65",
  month =        sep # "\slash " # oct,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.119",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:37 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Fraser:2007:CRU,
  author =       "David Fraser",
  title =        "The {Canadian} Response to the {USA Patriot Act}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "5",
  pages =        "66--68",
  month =        sep # "\slash " # oct,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.125",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:37 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Gratzer:2007:TNS,
  author =       "Vanessa Gratzer and David Naccache",
  title =        "Trust on a Nationwide Scale",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "5",
  pages =        "69--71",
  month =        sep # "\slash " # oct,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.127",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:37 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Solomon:2007:BPR,
  author =       "Dianne Solomon",
  title =        "Balancing Privacy and Risk in the {E}-Messaging
                 World",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "5",
  pages =        "72--75",
  month =        sep # "\slash " # oct,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.105",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:37 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{McGraw:2007:OGS,
  author =       "Gary McGraw and Greg Hoglund",
  title =        "Online Games and Security",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "5",
  pages =        "76--79",
  month =        sep # "\slash " # oct,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.116",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:37 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Dushin:2007:HMC,
  author =       "Fred Dushin and Eric Newcomer",
  title =        "Handling Multiple Credentials in a Heterogeneous {SOA}
                 Environment",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "5",
  pages =        "80--82",
  month =        sep # "\slash " # oct,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.110",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:37 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Dingledine:2007:DLL,
  author =       "Roger Dingledine and Nick Mathewson and Paul
                 Syverson",
  title =        "Deploying Low-Latency Anonymity: Design Challenges and
                 Social Factors",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "5",
  pages =        "83--87",
  month =        sep # "\slash " # oct,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.108",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:37 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Bellovin:2007:SC,
  author =       "Steve Bellovin",
  title =        "Seers and Craftspeople",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "5",
  pages =        "88",
  month =        sep # "\slash " # oct,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.120",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:37 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://bell.computer.org/dlcomments/",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Landwehr:2007:RTC,
  author =       "Carl E. Landwehr",
  title =        "Revolution through Competition?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "6",
  pages =        "3--4",
  month =        nov # "\slash " # dec,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.174",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:37 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2007/06/msp2007060003.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Ortega:2007:NBf,
  author =       "Brandi Ortega",
  title =        "News Briefs",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "6",
  pages =        "6--7",
  month =        nov # "\slash " # dec,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.172",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:37 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2007/06/msp2007060006.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{McGraw:2007:ISBb,
  author =       "Gary McGraw",
  title =        "Interview: {Silver Bullet} Talks with {Mikko
                 Hypp{\"o}nen}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "6",
  pages =        "8--11",
  month =        nov # "\slash " # dec,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.177",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:37 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Stytz:2007:WN,
  author =       "Martin R. Stytz",
  title =        "What Are the Numbers?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "6",
  pages =        "12",
  month =        nov # "\slash " # dec,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.183",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:37 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2007/06/msp2007060012.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Jakobsson:2007:WCP,
  author =       "Markus Jakobsson and Sid Stamm",
  title =        "{Web} Camouflage: Protecting Your Clients from
                 Browser-Sniffing Attacks",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "6",
  pages =        "16--24",
  month =        nov # "\slash " # dec,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.182",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:37 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Hole:2007:LNA,
  author =       "Kjell J. Hole and Vebj{\o}rn Moen and Andr{\'e} N.
                 Klingsheim and Knut M. Tande",
  title =        "Lessons from the {Norwegian} {ATM} System",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "6",
  pages =        "25--31",
  month =        nov # "\slash " # dec,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.168",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:37 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Piazzalunga:2007:SSM,
  author =       "Ugo Piazzalunga and Paolo Salvaneschi and Francesco
                 Balducci and Pablo Jacomuzzi and Cristiano Moroncelli",
  title =        "Security Strength Measurement for Dongle-Protected
                 Software",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "6",
  pages =        "32--40",
  month =        nov # "\slash " # dec,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.176",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:37 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Li:2007:CAS,
  author =       "Ninghui Li and Ji-Won Byun and Elisa Bertino",
  title =        "A Critique of the {ANSI Standard} on Role-Based Access
                 Control",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "6",
  pages =        "41--49",
  month =        nov # "\slash " # dec,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.158",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:37 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Ferraiolo:2007:RSR,
  author =       "David Ferraiolo and Rick Kuhn and Ravi Sandhu",
  title =        "{RBAC} Standard Rationale: Comments on {``A Critique
                 of the ANSI Standard on Role-Based Access Control''}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "6",
  pages =        "51--53",
  month =        nov # "\slash " # dec,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.173",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:37 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Petratos:2007:WIS,
  author =       "Pythagoras Petratos",
  title =        "Weather, Information Security, and Markets",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "6",
  pages =        "54--57",
  month =        nov # "\slash " # dec,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.181",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:37 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Power:2007:DCP,
  author =       "E. Michael Power",
  title =        "Developing a Culture of Privacy: a Case Study",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "6",
  pages =        "58--60",
  month =        nov # "\slash " # dec,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.163",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:37 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Vaudenay:2007:PT,
  author =       "Serge Vaudenay",
  title =        "{E}-Passport Threats",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "6",
  pages =        "61--64",
  month =        nov # "\slash " # dec,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.164",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:37 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Ford:2007:HSI,
  author =       "Richard Ford and William H. Allen",
  title =        "How Not to Be Seen {II}: The Defenders Fight Back",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "6",
  pages =        "65--68",
  month =        nov # "\slash " # dec,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.166",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:37 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{McKinney:2007:VB,
  author =       "David McKinney",
  title =        "Vulnerability Bazaar",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "6",
  pages =        "69--73",
  month =        nov # "\slash " # dec,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.180",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:37 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Perrone:2007:CCD,
  author =       "Luiz Felipe Perrone",
  title =        "Could a Caveman Do It? {The} Surprising Potential of
                 Simple Attacks",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "6",
  pages =        "74--77",
  month =        nov # "\slash " # dec,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.162",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:37 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Stytz:2007:WEW,
  author =       "Martin R. Stytz",
  title =        "Who Are the Experts, and What Have They Done for Us
                 Lately?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "6",
  pages =        "78--80",
  month =        nov # "\slash " # dec,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.184",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:37 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Steven:2007:M,
  author =       "John Steven and Gunnar Peterson",
  title =        "{Metricon 2.0}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "6",
  pages =        "81--83",
  month =        nov # "\slash " # dec,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.171",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:37 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Bishop:2007:APT,
  author =       "Matt Bishop",
  title =        "About Penetration Testing",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "6",
  pages =        "84--87",
  month =        nov # "\slash " # dec,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.159",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:37 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Schneier:2007:DSI,
  author =       "Bruce Schneier",
  title =        "The Death of the Security Industry",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "5",
  number =       "6",
  pages =        "88",
  month =        nov # "\slash " # dec,
  year =         "2007",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2007.179",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:37 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Donner:2008:CLB,
  author =       "Marc Donner",
  title =        "Charge of the Light Brigade",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "1",
  pages =        "5--5",
  month =        jan # "\slash " # feb,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.7",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2008/01/msp2008010005.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Ortega:2008:NBa,
  author =       "Brandi Ortega",
  title =        "News Briefs",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "1",
  pages =        "6--8",
  month =        jan # "\slash " # feb,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.16",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2008/01/msp2008010006.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Spafford:2008:JPA,
  author =       "Eugene Spafford",
  title =        "{James P. Anderson}: An Information Security Pioneer",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "1",
  pages =        "9",
  month =        jan # "\slash " # feb,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.15",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2008/01/msp2008010009.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{McGraw:2008:ISBa,
  author =       "Gary McGraw",
  title =        "Interview: {Silver Bullet} Talks with {Eugene
                 Spafford}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "1",
  pages =        "10--15",
  month =        jan # "\slash " # feb,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.22",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2008/01/msp2008010010.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Bellovin:2008:IAT,
  author =       "Steven M. Bellovin and Terry V. Benzel and Bob Blakley
                 and Dorothy E. Denning and Whitfield Diffie and Jeremy
                 Epstein and Paulo Ver{\'\i}ssimo",
  title =        "{Information Assurance Technology Forecast 2008}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "1",
  pages =        "16--23",
  month =        jan # "\slash " # feb,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.13",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Bellovin:2008:RCS,
  author =       "Steven M. Bellovin and Matt Blaze and Whitfield Diffie
                 and Susan Landau and Peter G. Neumann and Jennifer
                 Rexford",
  title =        "Risking Communications Security: Potential Hazards of
                 the {Protect America Act}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "1",
  pages =        "24--33",
  month =        jan # "\slash " # feb,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.17",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Pearson:2008:SIT,
  author =       "Siani Pearson and Marco Casassa-Mont and Manny Novoa",
  title =        "Securing Information Transfer in Distributed Computing
                 Environments",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "1",
  pages =        "34--42",
  month =        jan # "\slash " # feb,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.19",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Chakrabarti:2008:GCS,
  author =       "Anirban Chakrabarti and Anish Damodaran and Shubhashis
                 Sengupta",
  title =        "{Grid} Computing Security: a Taxonomy",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "1",
  pages =        "44--51",
  month =        jan # "\slash " # feb,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.12",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Leversage:2008:ESM,
  author =       "David John Leversage and Eric James Byres",
  title =        "Estimating a System's Mean Time-to-Compromise",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "1",
  pages =        "52--60",
  month =        jan # "\slash " # feb,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.9",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Greitzer:2008:CIC,
  author =       "Frank L. Greitzer and Andrew P. Moore and Dawn M.
                 Cappelli and Dee H. Andrews and Lynn A. Carroll and
                 Thomas D. Hull",
  title =        "Combating the Insider Cyber Threat",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "1",
  pages =        "61--64",
  month =        jan # "\slash " # feb,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.8",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Carbone:2008:TV,
  author =       "Martim Carbone and Diego Zamboni and Wenke Lee",
  title =        "Taming Virtualization",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "1",
  pages =        "65--67",
  month =        jan # "\slash " # feb,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.24",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Kolupaev:2008:CHV,
  author =       "Aleksey Kolupaev and Juriy Ogijenko",
  title =        "{CAPTCHAs}: Humans vs. Bots",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "1",
  pages =        "68--70",
  month =        jan # "\slash " # feb,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.6",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Howard:2008:BSE,
  author =       "Michael Howard",
  title =        "Becoming a Security Expert",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "1",
  pages =        "71--73",
  month =        jan # "\slash " # feb,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.3",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Ahmad:2008:CDD,
  author =       "Dave Ahmad",
  title =        "The Confused Deputy and the Domain Hijacker",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "1",
  pages =        "74--77",
  month =        jan # "\slash " # feb,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.25",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Lesk:2008:FSI,
  author =       "Michael Lesk",
  title =        "Forum Shopping on the {Internet}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "1",
  pages =        "78--80",
  month =        jan # "\slash " # feb,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.10",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Bonver:2008:STI,
  author =       "Edward Bonver",
  title =        "Security Testing of Internal Tools",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "1",
  pages =        "81--83",
  month =        jan # "\slash " # feb,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.21",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Coyne:2008:RII,
  author =       "Ed Coyne and Tim Weil",
  title =        "An {RBAC} Implementation and Interoperability
                 Standard: The {INCITS} Cyber Security 1.1 Model",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "1",
  pages =        "84--87",
  month =        jan # "\slash " # feb,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.2",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Geer:2008:WWG,
  author =       "Dan Geer and Daniel Conway",
  title =        "What We Got for {Christmas}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "1",
  pages =        "88",
  month =        jan # "\slash " # feb,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.26",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://bell.computer.org/dlcomments/",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Donner:2008:LEI,
  author =       "Marc Donner",
  title =        "Lessons from Electrification for Identification",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "2",
  pages =        "3",
  month =        mar # "\slash " # apr,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.38",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2008/02/msp2008020003.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Garfinkel:2008:SFF,
  author =       "Simson Garfinkel",
  title =        "Sharp Figures, Fuzzy Purpose",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "2",
  pages =        "5",
  month =        mar # "\slash " # apr,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.45",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2008/02/msp2008020005.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{McGraw:2008:ISBb,
  author =       "Gary McGraw",
  title =        "Interview: {Silver Bullet} Talks with {Ed Amoroso}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "2",
  pages =        "6--9",
  month =        mar # "\slash " # apr,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.46",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2008/02/msp2008020006.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Ortega:2008:NBb,
  author =       "Brandi Ortega",
  title =        "News Briefs",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "2",
  pages =        "10--12",
  month =        mar # "\slash " # apr,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.40",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2008/02/msp2008020010.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Landau:2008:IPS,
  author =       "Susan Landau and Deirdre K. Mulligan",
  title =        "{I}'m {Pc01002/SpringPeeper\slash ED288l.6}; Who are
                 You?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "2",
  pages =        "13--15",
  month =        mar # "\slash " # apr,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.34",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2008/02/msp2008020013.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Maler:2008:VIO,
  author =       "Eve Maler and Drummond Reed",
  title =        "The {Venn} of Identity: Options and Issues in
                 Federated Identity Management",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "2",
  pages =        "16--23",
  month =        mar # "\slash " # apr,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.50",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Dhamija:2008:SFI,
  author =       "Rachna Dhamija and Lisa Dusseault",
  title =        "The Seven Flaws of Identity Management: Usability and
                 Security Challenges",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "2",
  pages =        "24--29",
  month =        mar # "\slash " # apr,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.49",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Wayman:2008:BIM,
  author =       "James L. Wayman",
  title =        "Biometrics in Identity Management Systems",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "2",
  pages =        "30--37",
  month =        mar # "\slash " # apr,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.28",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Hansen:2008:PIM,
  author =       "Marit Hansen and Ari Schwartz and Alissa Cooper",
  title =        "Privacy and Identity Management",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "2",
  pages =        "38--45",
  month =        mar # "\slash " # apr,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.41",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Acquisti:2008:IMP,
  author =       "Alessandro Acquisti",
  title =        "Identity Management, Privacy, and Price
                 Discrimination",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "2",
  pages =        "46--50",
  month =        mar # "\slash " # apr,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.35",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{McKenzie:2008:UCI,
  author =       "Robin McKenzie and Malcolm Crompton and Colin Wallis",
  title =        "Use Cases for Identity Management in {E}-Government",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "2",
  pages =        "51--57",
  month =        mar # "\slash " # apr,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.51",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Dube:2008:HRE,
  author =       "Thomas E. Dube and Bobby D. Birrer and Richard A.
                 Raines and Rusty O. Baldwin and Barry E. Mullins and
                 Robert W. Bennington and Christopher E. Reuter",
  title =        "Hindering Reverse Engineering: Thinking Outside the
                 Box",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "2",
  pages =        "58--65",
  month =        mar # "\slash " # apr,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.33",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Jakobsson:2008:WHP,
  author =       "Markus Jakobsson and Nathaniel Johnson and Peter
                 Finn",
  title =        "Why and How to Perform Fraud Experiments",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "2",
  pages =        "66--68",
  month =        mar # "\slash " # apr,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.52",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Levieil:2008:CTC,
  author =       "Eric Levieil and David Naccache",
  title =        "Cryptographic Test Correction",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "2",
  pages =        "69--71",
  month =        mar # "\slash " # apr,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.30",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Carvalho:2008:SMA,
  author =       "Marco Carvalho",
  title =        "Security in Mobile Ad Hoc Networks",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "2",
  pages =        "72--75",
  month =        mar # "\slash " # apr,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.44",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{McKinney:2008:NHV,
  author =       "David McKinney",
  title =        "New Hurdles for Vulnerability Disclosure",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "2",
  pages =        "76--78",
  month =        mar # "\slash " # apr,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.39",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Locasto:2008:HDW,
  author =       "Michael E. Locasto and Angelos Stavrou",
  title =        "The Hidden Difficulties of Watching and Rebuilding
                 Networks",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "2",
  pages =        "79--82",
  month =        mar # "\slash " # apr,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.48",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Harding:2008:DSA,
  author =       "Patrick Harding and Leif Johansson and Nate
                 Klingenstein",
  title =        "{Dynamic Security Assertion Markup Language}:
                 Simplifying Single Sign-On",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "2",
  pages =        "83--85",
  month =        mar # "\slash " # apr,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.31",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Geer:2008:BIM,
  author =       "Daniel E. {Geer, Jr.} and Daniel G. Conway",
  title =        "Beware the {IDs of March}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "2",
  pages =        "87",
  month =        mar # "\slash " # apr,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.27",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Bellovin:2008:SC,
  author =       "Steve Bellovin",
  title =        "Security by Checklist",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "2",
  pages =        "88",
  month =        mar # "\slash " # apr,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.43",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://bell.computer.org/dlcomments/",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Landwehr:2008:S,
  author =       "Carl E. Landwehr",
  title =        "Up Scope",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "3",
  pages =        "3--4",
  month =        may # "\slash " # jun,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.76",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2008/03/msp2008030003.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Ortega:2008:NBc,
  author =       "Brandi Ortega",
  title =        "News Briefs",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "3",
  pages =        "6--8",
  month =        may # "\slash " # jun,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.69",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{McGraw:2008:ISBc,
  author =       "Gary McGraw",
  title =        "Interview: {Silver Bullet} Talks with {Jon Swartz}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "3",
  pages =        "9--11",
  month =        may # "\slash " # jun,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.72",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Rubin:2008:NRR,
  author =       "Aviel D. Rubin and David R. Jefferson",
  title =        "New Research Results for Electronic Voting",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "3",
  pages =        "12--13",
  month =        may # "\slash " # jun,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.68",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/comp/mags/sp/2008/03/msp2008030012.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Santin:2008:TBB,
  author =       "Altair O. Santin and Regivaldo G. Costa and Carlos A.
                 Maziero",
  title =        "A Three-Ballot-Based Secure Electronic Voting System",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "3",
  pages =        "14--21",
  month =        may # "\slash " # jun,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.56",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Yasinsac:2008:DCR,
  author =       "Alec Yasinsac and Matt Bishop",
  title =        "The Dynamics of Counting and Recounting Votes",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "3",
  pages =        "22--29",
  month =        may # "\slash " # jun,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.75",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Ansari:2008:EEV,
  author =       "Nirwan Ansari and Pitipatana Sakarindr and Ehsan
                 Haghani and Chao Zhang and Aridaman K. Jain and Yun Q.
                 Shi",
  title =        "Evaluating Electronic Voting Systems Equipped with
                 Voter-Verified Paper Records",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "3",
  pages =        "30--39",
  month =        may # "\slash " # jun,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.62",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Chaum:2008:SEE,
  author =       "David Chaum and Aleks Essex and Richard Carback and
                 Jeremy Clark and Stefan Popoveniuc and Alan Sherman and
                 Poorvi Vora",
  title =        "Scantegrity: End-to-End Voter-Verifiable Optical-Scan
                 Voting",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "3",
  pages =        "40--46",
  month =        may # "\slash " # jun,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.70",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Goirizelaia:2008:OSV,
  author =       "I{\~n}aki Goirizelaia and Ted Selker and Maider Huarte
                 and Juanjo Unzilla",
  title =        "An Optical Scan {E}-Voting System based on {N}-Version
                 Programming",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "3",
  pages =        "47--53",
  month =        may # "\slash " # jun,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.57",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Batten:2008:TDF,
  author =       "Lynn Batten and Lei Pan",
  title =        "Teaching Digital Forensics to Undergraduate Students",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "3",
  pages =        "54--56",
  month =        may # "\slash " # jun,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.74",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Hughes:2008:CNP,
  author =       "Gordon Hughes and Sophie Dawson and Tim Brookes",
  title =        "Considering New Privacy Laws in {Australia}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "3",
  pages =        "57--59",
  month =        may # "\slash " # jun,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.60",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Burr:2008:NHC,
  author =       "William E. Burr",
  title =        "A New Hash Competition",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "3",
  pages =        "60--62",
  month =        may # "\slash " # jun,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.55",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Michener:2008:CPM,
  author =       "John R. Michener",
  title =        "Common Permissions in {Microsoft Windows Server 2008}
                 and {Windows Vista}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "3",
  pages =        "63--67",
  month =        may # "\slash " # jun,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.59",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{ODonnell:2008:WMA,
  author =       "Adam J. O'Donnell",
  title =        "When Malware Attacks (Anything but {Windows})",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "3",
  pages =        "68--70",
  month =        may # "\slash " # jun,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.78",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Bratus:2008:WDS,
  author =       "Sergey Bratus and Chris Masone and Sean W. Smith",
  title =        "Why Do Street-Smart People Do Stupid Things Online?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "3",
  pages =        "71--74",
  month =        may # "\slash " # jun,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.79",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Lesk:2008:DRM,
  author =       "Michael Lesk",
  title =        "Digital Rights Management and Individualized Pricing",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "3",
  pages =        "76--79",
  month =        may # "\slash " # jun,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.61",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Epstein:2008:SLL,
  author =       "Jeremy Epstein",
  title =        "Security Lessons Learned from {Soci{\'e}t{\'e}
                 G{\'e}n{\'e}rale}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "3",
  pages =        "80--82",
  month =        may # "\slash " # jun,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.71",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Frankel:2008:IPV,
  author =       "Sheila Frankel and David Green",
  title =        "{Internet Protocol Version 6}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "3",
  pages =        "83--86",
  month =        may # "\slash " # jun,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.65",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Geer:2008:LAT,
  author =       "Daniel E. {Geer, Jr.}",
  title =        "Learn by Analogy or Die Trying",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "3",
  pages =        "88, 87",
  month =        may # "\slash " # jun,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.66",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 3 12:03:38 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://bell.computer.org/dlcomments/",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Schneider:2008:NNV,
  author =       "Fred B. Schneider",
  title =        "Network Neutrality versus {Internet}
                 Trustworthiness?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "4",
  pages =        "3--4",
  month =        jul # "\slash " # aug,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.90",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 6 14:53:07 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{McGraw:2008:ISBd,
  author =       "Gary McGraw",
  title =        "Interview: {Silver Bullet} Talks with {Adam
                 Shostack}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "4",
  pages =        "6--10",
  month =        jul # "\slash " # aug,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.104",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 6 14:53:07 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Ortega:2008:NBd,
  author =       "Brandi Ortega",
  title =        "News Briefs",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "4",
  pages =        "11--13",
  month =        jul # "\slash " # aug,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.91",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 6 14:53:07 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Hole:2008:OWN,
  author =       "Kjell J. Hole and Lars-Helge Netland and Yngve Espelid
                 and Andr{\'e} N. Klingsheim and Hallvar Helleseth and
                 Jan B. Henriksen",
  title =        "Open Wireless Networks on University Campuses",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "4",
  pages =        "14--20",
  month =        jul # "\slash " # aug,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.92",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 6 14:53:07 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Razaq:2008:SGR,
  author =       "Abdul (Ali) Razaq and Wai Tong Luk and Kam Man Shum
                 and Lee Ming Cheng and Kai Ning Yung",
  title =        "Second-Generation {RFID}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "4",
  pages =        "21--27",
  month =        jul # "\slash " # aug,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.94",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 6 14:53:07 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Pai:2008:TCS,
  author =       "Sameer Pai and Sergio Bermudez and Stephen B. Wicker
                 and Marci Meingast and Tanya Roosta and Shankar Sastry
                 and Deirdre K. Mulligan",
  title =        "Transactional Confidentiality in Sensor Networks",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "4",
  pages =        "28--35",
  month =        jul # "\slash " # aug,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.107",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 6 14:53:07 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Weigold:2008:RCA,
  author =       "Thomas Weigold and Thorsten Kramp and Michael
                 Baentsch",
  title =        "Remote Client Authentication",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "4",
  pages =        "36--43",
  month =        jul # "\slash " # aug,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.93",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 6 14:53:07 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Pretschner:2008:UCE,
  author =       "Alexander Pretschner and Manuel Hilty and Florian
                 Sch{\"u}tz and Christian Schaefer and Thomas Walter",
  title =        "Usage Control Enforcement: Present and Future",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "4",
  pages =        "44--53",
  month =        jul # "\slash " # aug,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.101",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 6 14:53:07 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Rostad:2008:LFF,
  author =       "Lillian R{\o}stad and Gunnar Ren{\'e} {\O}ie and Inger
                 Anne T{\o}ndel and Per H{\aa}kon Meland",
  title =        "Learning by Failing (and Fixing)",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "4",
  pages =        "54--56",
  month =        jul # "\slash " # aug,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.89",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 6 14:53:07 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2008:CPO,
  author =       "Anonymous",
  title =        "Call for Papers: {Online Gaming Security}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "4",
  pages =        "57--57",
  month =        jul # "\slash " # aug,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.81",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 6 14:53:07 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{ElEmam:2008:HIH,
  author =       "Khaled {El Emam}",
  title =        "Heuristics for De-identifying Health Data",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "4",
  pages =        "58--61",
  month =        jul # "\slash " # aug,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.84",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 6 14:53:07 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Troutman:2008:VMM,
  author =       "Justin Troutman",
  title =        "The Virtues of Mature and Minimalist Cryptography",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "4",
  pages =        "62--65",
  month =        jul # "\slash " # aug,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.99",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 6 14:53:07 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Predd:2008:IBB,
  author =       "Joel Predd and Shari Lawrence Pfleeger and Jeffrey
                 Hunker and Carla Bulford",
  title =        "Insiders Behaving Badly",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "4",
  pages =        "66--70",
  month =        jul # "\slash " # aug,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.87",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 6 14:53:07 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2008:MA,
  author =       "Anonymous",
  title =        "2008 Membership advertisement",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "4",
  pages =        "71--73",
  month =        jul # "\slash " # aug,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.103",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 6 14:53:07 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Landau:2008:SPL,
  author =       "Susan Landau",
  title =        "Security and Privacy Landscape in Emerging
                 Technologies",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "4",
  pages =        "74--77",
  month =        jul # "\slash " # aug,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.95",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 6 14:53:07 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Geer:2008:SA,
  author =       "Daniel E. {Geer, Jr.} and Daniel G. Conway",
  title =        "Strong Attractors",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "4",
  pages =        "78--79",
  month =        jul # "\slash " # aug,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.105",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 6 14:53:07 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Schneier:2008:HHB,
  author =       "Bruce Schneier",
  title =        "How the Human Brain Buys Security",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "4",
  pages =        "80--80",
  month =        jul # "\slash " # aug,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.85",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 6 14:53:07 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2008:CNS,
  author =       "Anonymous",
  title =        "Corporate Network Security advertisement",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "4",
  pages =        "c3--c3",
  month =        jul # "\slash " # aug,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.82",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 6 14:53:07 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2008:FC,
  author =       "Anonymous",
  title =        "Front Cover",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "4",
  pages =        "c1--c1",
  month =        jul # "\slash " # aug,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.83",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 6 14:53:07 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2008:ISW,
  author =       "Anonymous",
  title =        "{IT Security World} advertisement",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "4",
  pages =        "c2--c2",
  month =        jul # "\slash " # aug,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.88",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 6 14:53:07 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2008:USS,
  author =       "Anonymous",
  title =        "{Usenix Security Symposium} advertisement",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "4",
  pages =        "c4--c4",
  month =        jul # "\slash " # aug,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.102",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 6 14:53:07 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Landwehr:2008:ECA,
  author =       "Carl E. Landwehr",
  title =        "From the {Editors}: Cybersecurity and Artificial
                 Intelligence: From Fixing the Plumbing to Smart Water",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "5",
  pages =        "3--4",
  month =        sep # "\slash " # oct,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.113",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Stytz:2008:BRS,
  author =       "Martin R. Stytz",
  title =        "Book Reviews: The Shape of Crimeware to Come",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "5",
  pages =        "5--5",
  month =        sep # "\slash " # oct,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.130",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{McGraw:2008:ISBe,
  author =       "Gary McGraw",
  title =        "Interview: {Silver Bullet} Talks with {Bill
                 Cheswick}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "5",
  pages =        "7--11",
  month =        sep # "\slash " # oct,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.127",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Ortega:2008:NBe,
  author =       "Brandi Ortega",
  title =        "News Briefs",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "5",
  pages =        "12--13",
  month =        sep # "\slash " # oct,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.108",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{King:2008:GEI,
  author =       "Samuel T. King and Sean W. Smith",
  title =        "{Guest Editors}' Introduction: Virtualization and
                 Security: Back to the Future",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "5",
  pages =        "15--15",
  month =        sep # "\slash " # oct,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.136",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Karger:2008:VVM,
  author =       "Paul A. Karger and David R. Safford",
  title =        "Virtualization: {I/O} for Virtual Machine Monitors:
                 Security and Performance Issues",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "5",
  pages =        "16--23",
  month =        sep # "\slash " # oct,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.119",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Perez:2008:VHB,
  author =       "Ronald Perez and Leendert van Doorn and Reiner
                 Sailer",
  title =        "Virtualization and Hardware-Based Security",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "5",
  pages =        "24--31",
  month =        sep # "\slash " # oct,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.135",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Nance:2008:VMI,
  author =       "Kara Nance and Matt Bishop and Brian Hay",
  title =        "Virtual Machine Introspection: Observation or
                 Interference?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "5",
  pages =        "32--37",
  month =        sep # "\slash " # oct,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.134",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Ryan:2008:RMP,
  author =       "Julie J. C. H. Ryan and Daniel J. Ryan",
  title =        "Risk Management: Performance Metrics for Information
                 Security Risk Management",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "5",
  pages =        "38--44",
  month =        sep # "\slash " # oct,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.125",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Kotzanikolaou:2008:DPD,
  author =       "Panayiotis Kotzanikolaou",
  title =        "Data Privacy: Data Retention and Privacy in Electronic
                 Communications",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "5",
  pages =        "46--52",
  month =        sep # "\slash " # oct,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.114",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Bishop:2008:EIA,
  author =       "Matt Bishop and Deborah A. Frincke",
  title =        "Education: Information Assurance Education: a Work In
                 Progress",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "5",
  pages =        "54--57",
  month =        sep # "\slash " # oct,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.123",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{McLaughlin:2008:PIC,
  author =       "Peter McLaughlin",
  title =        "Privacy Interests: Cross-Border Data Flows and
                 Increased Enforcement",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "5",
  pages =        "58--61",
  month =        sep # "\slash " # oct,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.111",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Martin:2008:CCI,
  author =       "Luther Martin",
  title =        "Crypto Corner: Identity-Based Encryption and Beyond",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "5",
  pages =        "62--64",
  month =        sep # "\slash " # oct,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.120",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Yan:2008:BTR,
  author =       "Wei Yan and Zheng Zhang and Nirwan Ansari",
  title =        "Basic Training: Revealing Packed Malware",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "5",
  pages =        "65--69",
  month =        sep # "\slash " # oct,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.126",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Ahmad:2008:ATT,
  author =       "David Ahmad",
  title =        "Attack Trends: Two Years of Broken Crypto: {Debian}'s
                 Dress Rehearsal for a Global {PKI} Compromise",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "5",
  pages =        "70--73",
  month =        sep # "\slash " # oct,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.131",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  abstract =     "A patch to the OpenSSL package maintained by Debian
                 GNU/Linux (an operating system composed of free and
                 open source software that can be used as a desktop or
                 server OS) submitted in 2006 weakened its pseudo-random
                 number generator (PRNG), a critical component for
                 secure key generation. Putting both servers and users
                 at risk, this vulnerability affected OpenSSH, Apache
                 (mod\_ssl), the onion router (TOR), OpenVPN, and other
                 applications. In this article, the author examines
                 these issue and its consequences. OpenSSL is an open
                 source library implementing the SSL (Secure Socket
                 Layer) and TLS (Transport Layer Security) protocols.
                 Several widely deployed applications on many OSs rely
                 on it for secure communications, particularly Linux and
                 BSD-based systems. Where in use, it's a critical part
                 of the OS's security subsystem.",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Viecco:2008:SSL,
  author =       "Camilo Viecco and Jean Camp",
  title =        "Secure Systems: a Life or Death {InfoSec} Subversion",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "5",
  pages =        "74--76",
  month =        sep # "\slash " # oct,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.109",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Trope:2008:DPH,
  author =       "Roland L. Trope and Monique Witt and William J.
                 Adams",
  title =        "Digital Protection: Hardening the Target",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "5",
  pages =        "77--81",
  month =        sep # "\slash " # oct,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.118",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Bonver:2008:BSD,
  author =       "Edward Bonver and Michael Cohen",
  title =        "Building Security In: Developing and Retaining a
                 Security Testing Mindset",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "5",
  pages =        "82--85",
  month =        sep # "\slash " # oct,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.115",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Geer:2008:GMT,
  author =       "Daniel E. {Geer, Jr.} and Daniel G. Conway",
  title =        "For Good Measure: Type {II} Reverse Engineering",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "5",
  pages =        "86--87",
  month =        sep # "\slash " # oct,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.132",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Bellovin:2008:CTP,
  author =       "Steven M. Bellovin",
  title =        "Clear Text: The Puzzle of Privacy",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "5",
  pages =        "88--88",
  month =        sep # "\slash " # oct,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.129",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  abstract =     "A number of recent news stories have made me wonder
                 more about privacy. It's not just that the threats to
                 privacy are increasing; rather, the problem is that the
                 countervailing forces are becoming very much stronger.
                 Was Scott McNealy right when he told us that we had no
                 privacy and that we should just ``get over it''?",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Michael:2008:EGT,
  author =       "Bret Michael",
  title =        "From the {Editors}: Are Governments Up to the Task?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "6",
  pages =        "4--5",
  month =        nov # "\slash " # dec,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.137",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{McGraw:2008:ISBf,
  author =       "Gary McGraw",
  title =        "Interview: {Silver Bullet} Talks with {Matt Bishop}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "6",
  pages =        "6--10",
  month =        nov # "\slash " # dec,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.153",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Saydjari:2008:SLC,
  author =       "O. Sami Saydjari",
  title =        "Spotlight: Launching into the Cyberspace Race: An
                 Interview with {Melissa E. Hathaway}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "6",
  pages =        "11--17",
  month =        nov # "\slash " # dec,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.147",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Figueroa:2008:NSC,
  author =       "James Figueroa and Brandi Ortega",
  title =        "News: Shaking Up the Cybersecurity Landscape",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "6",
  pages =        "18--21",
  month =        nov # "\slash " # dec,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.152",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Trellue:2008:GEI,
  author =       "Ron Trellue and Charles C. Palmer",
  title =        "{Guest Editors}' Introduction: Process Control System
                 Security: Bootstrapping a Legacy",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "6",
  pages =        "22--23",
  month =        nov # "\slash " # dec,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.148",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Brandle:2008:PCS,
  author =       "Markus Br{\"a}ndle and Martin Naedele",
  title =        "Process Control Security: Security for Process Control
                 Systems: An Overview",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "6",
  pages =        "24--29",
  month =        nov # "\slash " # dec,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.150",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Nicol:2008:UGN,
  author =       "David M. Nicol and William H. Sanders and Sankalp
                 Singh and Mouna Seri",
  title =        "Usable Global Network Access Policy for Process
                 Control Systems",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "6",
  pages =        "30--36",
  month =        nov # "\slash " # dec,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.159",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Parks:2008:VAC,
  author =       "Raymond C. Parks and Edmond Rogers",
  title =        "Vulnerability Assessment for Critical Infrastructure
                 Control Systems",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "6",
  pages =        "37--43",
  month =        nov # "\slash " # dec,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.160",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Bessani:2008:CWC,
  author =       "Alysson Neves Bessani and Paulo Sousa and Miguel
                 Correia and Nuno Ferreira Neves and Paulo
                 Ver{\'\i}ssimo",
  title =        "The Crutial Way of Critical Infrastructure
                 Protection",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "6",
  pages =        "44--51",
  month =        nov # "\slash " # dec,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.158",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Mathieu:2008:VIS,
  author =       "Bertrand Mathieu and Saverio Niccolini and Dorgham
                 Sisalem",
  title =        "{Voice over IP}: {SDRS}: a {Voice-over-IP} Spam
                 Detection and Reaction System",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "6",
  pages =        "52--59",
  month =        nov # "\slash " # dec,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.149",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  abstract =     "An expected surge in spam over Internet telephony
                 (SPIT) requires a solution that incorporates multiple
                 detection methods and reaction mechanisms, enabling
                 greater flexibility and customization. Our solution
                 framework combines well-known detection schemes, such
                 as blacklists and white lists, with methods based on
                 statistical traffic analysis, such as the number and
                 duration of calls a user conducts.",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Balfe:2008:TCC,
  author =       "Shane Balfe and Eimear Gallery and Chris J. Mitchell
                 and Kenneth G. Paterson",
  title =        "Trusted Computing: Challenges for Trusted Computing",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "6",
  pages =        "60--66",
  month =        nov # "\slash " # dec,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.138",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Chan:2008:ETC,
  author =       "Yuen-Yan Chan and Victor K. Wei",
  title =        "Education: Teaching for Conceptual Change in Security
                 Awareness",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "6",
  pages =        "67--69",
  month =        nov # "\slash " # dec,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.157",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Nahra:2008:PIH,
  author =       "Kirk J. Nahra",
  title =        "Privacy Interests: {HIPAA} Security Enforcement Is
                 Here",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "6",
  pages =        "70--72",
  month =        nov # "\slash " # dec,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.143",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Chu:2008:BTI,
  author =       "Chengyun Chu",
  title =        "Basic Training: Introduction to {Microsoft .NET}
                 Security",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "6",
  pages =        "73--78",
  month =        nov # "\slash " # dec,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.146",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Grossman:2008:ATF,
  author =       "Jeremiah Grossman",
  title =        "Attack Trends: Five User-Customizable {Web} Site
                 Security Features",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "6",
  pages =        "79--81",
  month =        nov # "\slash " # dec,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.141",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Steven:2008:BSS,
  author =       "John Steven",
  title =        "Building Security In: State of Application
                 Assessment",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "6",
  pages =        "82--85",
  month =        nov # "\slash " # dec,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.155",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Geer:2008:GMS,
  author =       "Daniel E. {Geer, Jr.} and Daniel G. Conway",
  title =        "For Good Measure: Security Is a Subset of
                 Reliability",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "6",
  pages =        "86--87",
  month =        nov # "\slash " # dec,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.151",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Geer:2008:CTC,
  author =       "Daniel E. {Geer, Jr.}",
  title =        "Clear Text: Complexity Is the Enemy",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "6",
  pages =        "88--88",
  month =        nov # "\slash " # dec,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.139",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2008:AI,
  author =       "Anonymous",
  title =        "Annual Index",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "6",
  number =       "6",
  pages =        "0--0",
  month =        nov # "\slash " # dec,
  year =         "2008",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2008.161",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Donner:2009:ERE,
  author =       "Marc Donner",
  title =        "From the {Editors}: Reading (with) the Enemy",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "1",
  pages =        "3--3",
  month =        jan # "\slash " # feb,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.16",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Ortega:2009:NBS,
  author =       "Brandi Ortega",
  title =        "News Briefs: Shaking Up the Cybersecurity Landscape",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "1",
  pages =        "5--6",
  month =        jan # "\slash " # feb,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.19",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{McGraw:2009:ISBa,
  author =       "Gary McGraw",
  title =        "Interview: {Silver Bullet} Talks with {Gunnar
                 Peterson}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "1",
  pages =        "7--11",
  month =        jan # "\slash " # feb,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.20",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Lala:2009:GEI,
  author =       "Jaynarayan H. Lala and Fred B. Schneider",
  title =        "{Guest Editors}' Introduction: {IT} Monoculture
                 Security Risks and Defenses",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "1",
  pages =        "12--13",
  month =        jan # "\slash " # feb,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.11",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Birman:2009:IMM,
  author =       "Kenneth P. Birman and Fred B. Schneider",
  title =        "{IT} Monoculture: The Monoculture Risk Put into
                 Context",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "1",
  pages =        "14--17",
  month =        jan # "\slash " # feb,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.24",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Keromytis:2009:RIS,
  author =       "Angelos D. Keromytis",
  title =        "Randomized Instruction Sets and Runtime Environments
                 Past Research and Future Directions",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "1",
  pages =        "18--25",
  month =        jan # "\slash " # feb,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.15",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Williams:2009:STD,
  author =       "Daniel Williams and Wei Hu and Jack W. Davidson and
                 Jason D. Hiser and John C. Knight and Anh
                 Nguyen-Tuong",
  title =        "Security through Diversity: Leveraging Virtual Machine
                 Technology",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "1",
  pages =        "26--33",
  month =        jan # "\slash " # feb,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.18",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Hole:2009:APR,
  author =       "Kjell J. Hole and Andr{\'e} N. Klingsheim and
                 Lars-Helge Netland and Yngve Espelid and Thomas
                 Tj{\O}stheim and Vebj{\O}rn Moen",
  title =        "Assessing {PKI}: Risk Assessment of a {National
                 Security Infrastructure}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "1",
  pages =        "34--41",
  month =        jan # "\slash " # feb,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.17",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Cukier:2009:VRP,
  author =       "Michel Cukier and Susmit Panjwani",
  title =        "Vulnerability Remediation: Prioritizing Vulnerability
                 Remediation by Determining Attacker-Targeted
                 Vulnerabilities",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "1",
  pages =        "42--48",
  month =        jan # "\slash " # feb,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.13",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Enck:2009:FUA,
  author =       "William Enck and Machigar Ongtang and Patrick
                 McDaniel",
  title =        "Focus: Understanding {Android} Security",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "1",
  pages =        "50--57",
  month =        jan # "\slash " # feb,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.26",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Landau:2009:PNT,
  author =       "Susan Landau",
  title =        "Perspectives: The {NRC} Takes on Data Mining,
                 Behavioral Surveillance, and Privacy",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "1",
  pages =        "58--62",
  month =        jan # "\slash " # feb,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.25",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Michael:2009:IAD,
  author =       "Bret Michael and Jeffrey Voas and Phil Laplante",
  title =        "It All Depends: Cyberpandemics: History,
                 Inevitability, Response",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "1",
  pages =        "63--67",
  month =        jan # "\slash " # feb,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.4",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Chan:2009:ETC,
  author =       "Yuen-Yan Chan and Victor K. Wei",
  title =        "Education: Teaching for Conceptual Change in Security
                 Awareness: a Case Study in Higher Education",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "1",
  pages =        "68--71",
  month =        jan # "\slash " # feb,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.22",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Kosseim:2009:PIP,
  author =       "Patricia Kosseim and Khaled {El Emam}",
  title =        "Privacy Interests: Privacy Interests in Prescription
                 Data, {Part I}: Prescriber Privacy",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "1",
  pages =        "72--76",
  month =        jan # "\slash " # feb,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.14",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Callegati:2009:BTM,
  author =       "Franco Callegati and Walter Cerroni and Marco
                 Ramilli",
  title =        "Basic Training: Man-in-the-Middle Attack to the
                 {HTTPS} Protocol",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "1",
  pages =        "78--81",
  month =        jan # "\slash " # feb,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.12",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Porras:2009:ATD,
  author =       "Phillip Porras",
  title =        "Attack Trends: Directions in Network-Based Security
                 Monitoring",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "1",
  pages =        "82--85",
  month =        jan # "\slash " # feb,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.5",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Geer:2009:GMO,
  author =       "Daniel E. {Geer, Jr.} and Daniel G. Conway",
  title =        "For Good Measure: The Owned Price Index",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "1",
  pages =        "86--87",
  month =        jan # "\slash " # feb,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.23",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Schneier:2009:CTA,
  author =       "Bruce Schneier",
  title =        "Clear Text: Architecture of Privacy",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "1",
  pages =        "88--88",
  month =        jan # "\slash " # feb,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.1",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Schneider:2009:EAP,
  author =       "Fred B. Schneider",
  title =        "From the {Editors}: Accountability for Perfection",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "2",
  pages =        "3--4",
  month =        mar # "\slash " # apr,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.30",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2009:STS,
  author =       "Anonymous",
  title =        "Special Thanks: Special Thanks to {S\&P}'s Peer
                 Reviewers",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "2",
  pages =        "5--6",
  month =        mar # "\slash " # apr,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.52",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Ortega:2009:NB,
  author =       "Brandi Ortega",
  title =        "News Briefs",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "2",
  pages =        "8--9",
  month =        mar # "\slash " # apr,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.45",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{McGraw:2009:ISBb,
  author =       "Gary McGraw",
  title =        "Interview: {Silver Bullet} Talks with {Jeremiah
                 Grossman}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "2",
  pages =        "10--14",
  month =        mar # "\slash " # apr,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.51",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Pfleeger:2009:BRS,
  author =       "Shari Lawrence Pfleeger",
  title =        "Book Reviews: Searching for You",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "2",
  pages =        "15--15",
  month =        mar # "\slash " # apr,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.48",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Caloyannides:2009:GEI,
  author =       "Michael A. Caloyannides and Nasir Memon and Wietse
                 Venema",
  title =        "{Guest Editors}' Introduction: Digital Forensics",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "2",
  pages =        "16--17",
  month =        mar # "\slash " # apr,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.34",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Caloyannides:2009:FY,
  author =       "Michael A. Caloyannides",
  title =        "Forensics Is So {``Yesterday''}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "2",
  pages =        "18--25",
  month =        mar # "\slash " # apr,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.37",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Carrier:2009:DFW,
  author =       "Brian D. Carrier",
  title =        "Digital Forensics Works",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "2",
  pages =        "26--29",
  month =        mar # "\slash " # apr,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.35",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Hay:2009:LAP,
  author =       "Brian Hay and Matt Bishop and Kara Nance",
  title =        "Live Analysis: Progress and Challenges",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "2",
  pages =        "30--37",
  month =        mar # "\slash " # apr,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.43",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Garfinkel:2009:NXB,
  author =       "Simson L. Garfinkel and James J. Migletz",
  title =        "New {XML}-Based Files Implications for Forensics",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "2",
  pages =        "38--44",
  month =        mar # "\slash " # apr,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.44",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Manes:2009:OLL,
  author =       "Gavin W. Manes and Elizabeth Downing",
  title =        "Overview of Licensing and Legal Issues for Digital
                 Forensic Investigators",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "2",
  pages =        "45--48",
  month =        mar # "\slash " # apr,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.46",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Roussev:2009:HDF,
  author =       "Vassil Roussev",
  title =        "Hashing and Data Fingerprinting in Digital Forensics",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "2",
  pages =        "49--55",
  month =        mar # "\slash " # apr,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.40",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Spiekermann:2009:ACR,
  author =       "Sarah Spiekermann and Sergei Evdokimov",
  title =        "Authentication: Critical {RFID} Privacy-Enhancing
                 Technologies",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "2",
  pages =        "56--62",
  month =        mar # "\slash " # apr,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.31",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Harauz:2009:IAD,
  author =       "John Harauz and Lori M. Kaufman",
  title =        "It All Depends: a New Era of Presidential Security:
                 The {President} and His {BlackBerry}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "2",
  pages =        "67--70",
  month =        mar # "\slash " # apr,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.29",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Ryoo:2009:ESE,
  author =       "Jungwoo Ryoo and Angsana Techatassanasoontorn and
                 Dongwon Lee",
  title =        "Education: Security Education Using Second Life",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "2",
  pages =        "71--74",
  month =        mar # "\slash " # apr,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.49",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{ElEmam:2009:PIP,
  author =       "Khaled {El Emam} and Patricia Kosseim",
  title =        "Privacy Interests: Privacy Interests in Prescription
                 Data, Part 2: Patient Privacy",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "2",
  pages =        "75--78",
  month =        mar # "\slash " # apr,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.47",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Brouchier:2009:CCT,
  author =       "Julien Brouchier and Tom Kean and Carol Marsh and
                 David Naccache",
  title =        "Crypto Corner: Temperature Attacks",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "2",
  pages =        "79--82",
  month =        mar # "\slash " # apr,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.54",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Jaatun:2009:ATF,
  author =       "Martin Gilje Jaatun and Jostein Jensen and H{\aa}vard
                 Vegge and Finn Michael Halvorsen and Rune Wals{\o}
                 Nerg{\aa}rd",
  title =        "Attack Trends: Fools Download Where Angels Fear to
                 Tread",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "2",
  pages =        "83--86",
  month =        mar # "\slash " # apr,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.36",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Zhivich:2009:SSR,
  author =       "Michael Zhivich and Robert K. Cunningham",
  title =        "Secure Systems: The Real Cost of Software Errors",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "2",
  pages =        "87--90",
  month =        mar # "\slash " # apr,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.56",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "Bellingham, WA, pipeline rupture; Patriot Missile
                 Defense System failure; radiation treatment overdoses",
}

@Article{Peterson:2009:BSS,
  author =       "Gunnar Peterson",
  title =        "Building Security In: Service-Oriented Security
                 Indications for Use",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "2",
  pages =        "91--93",
  month =        mar # "\slash " # apr,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.50",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Geer:2009:GMH,
  author =       "Daniel E. {Geer, Jr.} and Daniel G. Conway",
  title =        "For Good Measure: Hard Data Is Good to Find",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "2",
  pages =        "94--95",
  month =        mar # "\slash " # apr,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.39",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Bellovin:2009:CTG,
  author =       "Steven M. Bellovin",
  title =        "Clear Text: The Government and Cybersecurity",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "2",
  pages =        "96--96",
  month =        mar # "\slash " # apr,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.55",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Landwehr:2009:ENG,
  author =       "Carl E. Landwehr",
  title =        "From the {Editors}: a National Goal for Cyberspace:
                 Create an Open, Accountable {Internet}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "3",
  pages =        "3--4",
  month =        may # "\slash " # jun,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.58",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Figueroa:2009:NBa,
  author =       "James Figueroa",
  title =        "News Briefs",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "3",
  pages =        "6--7",
  month =        may # "\slash " # jun,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.73",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{McGovern:2009:ISB,
  author =       "James McGovern",
  title =        "Interview: {Silver Bullet} Talks with {Gary McGraw}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "3",
  pages =        "8--10",
  month =        may # "\slash " # jun,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.79",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{McGraw:2009:SOG,
  author =       "Gary McGraw and Ming Chow",
  title =        "Securing Online Games: {Guest Editors}' Introduction:
                 Securing Online Games: Safeguarding the Future of
                 Software Security",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "3",
  pages =        "11--12",
  month =        may # "\slash " # jun,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.65",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Bono:2009:RAS,
  author =       "Stephen Bono and Dan Caselden and Gabriel Landau and
                 Charlie Miller",
  title =        "Reducing the Attack Surface in Massively Multiplayer
                 Online Role-Playing Games",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "3",
  pages =        "13--19",
  month =        may # "\slash " # jun,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.75",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Portnoy:2009:WWC,
  author =       "Aaron Portnoy and Ali Rizvi-Santiago",
  title =        "Walking on Water: a Cheating Case Study",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "3",
  pages =        "20--22",
  month =        may # "\slash " # jun,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.82",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Kane:2009:VJL,
  author =       "Sean F. Kane",
  title =        "Virtual Judgment: Legal Implications of Online
                 Gaming",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "3",
  pages =        "23--28",
  month =        may # "\slash " # jun,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.81",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Mitterhofer:2009:SSB,
  author =       "Stefan Mitterhofer and Christopher Kruegel and Engin
                 Kirda and Christian Platzer",
  title =        "Server-Side Bot Detection in Massively Multiplayer
                 Online Games",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "3",
  pages =        "29--36",
  month =        may # "\slash " # jun,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.78",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Yan:2009:ICO,
  author =       "Jeff Yan and Brian Randell",
  title =        "An Investigation of Cheating in Online Games",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "3",
  pages =        "37--44",
  month =        may # "\slash " # jun,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.60",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Johnson:2009:IRS,
  author =       "M. Eric Johnson and Eric Goetz and Shari Lawrence
                 Pfleeger",
  title =        "Information Risk: Security through Information Risk
                 Management",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "3",
  pages =        "45--52",
  month =        may # "\slash " # jun,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.77",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Locasto:2009:EHS,
  author =       "Michael E. Locasto",
  title =        "Education: Helping Students Own Their Own Code",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "3",
  pages =        "53--56",
  month =        may # "\slash " # jun,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.66",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Varadharajan:2009:HNT,
  author =       "Vijay Varadharajan",
  title =        "On the Horizon: a Note on Trust-Enhanced Security",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "3",
  pages =        "57--59",
  month =        may # "\slash " # jun,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.59",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Donner:2009:BTW,
  author =       "Marc Donner",
  title =        "Biblio Tech: War Stories",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "3",
  pages =        "60--63",
  month =        may # "\slash " # jun,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.83",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Conti:2009:PIM,
  author =       "Gregory Conti and Edward Sobiesk",
  title =        "Privacy Interests: Malicious Interfaces and
                 Personalization's Uninviting Future",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "3",
  pages =        "64--67",
  month =        may # "\slash " # jun,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.71",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Howard:2009:BTI,
  author =       "Michael Howard",
  title =        "Basic Training: Improving Software Security by
                 Eliminating the {CWE} Top 25 Vulnerabilities",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "3",
  pages =        "68--71",
  month =        may # "\slash " # jun,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.69",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Zdrnja:2009:ATM,
  author =       "Bojan Zdrnja",
  title =        "Attack Trends: Malicious {JavaScript} Insertion
                 through {ARP} Poisoning Attacks",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "3",
  pages =        "72--74",
  month =        may # "\slash " # jun,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.72",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{McDaniel:2009:SSS,
  author =       "Patrick McDaniel and Stephen McLaughlin",
  title =        "Secure Systems: Security and Privacy Challenges in the
                 {Smart Grid}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "3",
  pages =        "75--77",
  month =        may # "\slash " # jun,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.76",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Lesk:2009:SPEa,
  author =       "Michael Lesk",
  title =        "Security {\&} Privacy Economics: Reading Over Your
                 Shoulder",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "3",
  pages =        "78--81",
  month =        may # "\slash " # jun,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.74",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Chuvakin:2009:BSL,
  author =       "Anton Chuvakin and Gunnar Peterson",
  title =        "Building Security In: Logging in the Age of {Web}
                 Services",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "3",
  pages =        "82--85",
  month =        may # "\slash " # jun,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.70",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Geer:2009:GMD,
  author =       "Daniel E. {Geer, Jr.} and Daniel G. Conway",
  title =        "For Good Measure: a Doubt of the Benefit",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "3",
  pages =        "86--87",
  month =        may # "\slash " # jun,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.57",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Geer:2009:CDE,
  author =       "Daniel E. {Geer, Jr.}",
  title =        "{ClearText}: Digital Endosymbiosis",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "3",
  pages =        "88--88",
  month =        may # "\slash " # jun,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.63",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jul 2 10:02:21 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Donner:2009:ENM,
  author =       "Marc Donner",
  title =        "From the Editors: New Models for Old",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "4",
  pages =        "3--4",
  month =        jul # "\slash " # aug,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.99",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 10 15:38:24 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2009:ILE,
  author =       "Anonymous",
  title =        "Interface: Letters to the Editor",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "4",
  pages =        "6--7",
  month =        jul # "\slash " # aug,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.95",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 10 15:38:24 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Figueroa:2009:NBb,
  author =       "James Figueroa",
  title =        "News Briefs",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "4",
  pages =        "8--10",
  month =        jul # "\slash " # aug,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.100",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 10 15:38:24 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{McGraw:2009:ISBc,
  author =       "Gary McGraw",
  title =        "Interview: Silver Bullet Talks with {Virgil Gligor}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "4",
  pages =        "11--14",
  month =        jul # "\slash " # aug,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.106",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 10 15:38:24 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Lin:2009:SRL,
  author =       "Herbert Lin",
  title =        "Special Report: Lifting the Veil on Cyber Offense",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "4",
  pages =        "15--21",
  month =        jul # "\slash " # aug,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.96",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 10 15:38:24 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Yan:2009:PCA,
  author =       "Jeff Yan and Ahmad Salah {El Ahmad}",
  title =        "Pixel-Count Attacks: {CAPTCHA} Security: a Case
                 Study",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "4",
  pages =        "22--28",
  month =        jul # "\slash " # aug,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.84",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 10 15:38:24 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Hughes:2009:SDS,
  author =       "Gordon F. Hughes and Tom Coughlin and Daniel M.
                 Commins",
  title =        "Secure Data Sanitization: Disposal of Disk and Tape
                 Data by Secure Sanitization",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "4",
  pages =        "29--34",
  month =        jul # "\slash " # aug,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.89",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 10 15:38:24 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Ni:2009:ACP,
  author =       "Qun Ni and Elisa Bertino and Jorge Lobo and Seraphin
                 B. Calo",
  title =        "Access Control: Privacy-Aware Role-Based Access
                 Control",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "4",
  pages =        "35--43",
  month =        jul # "\slash " # aug,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.102",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 10 15:38:24 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Meike:2009:ISS,
  author =       "Michael Meike and Johannes Sametinger and Andreas
                 Wiesauer",
  title =        "{Internet} Security: Security in Open Source {Web}
                 Content Management Systems",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "4",
  pages =        "44--51",
  month =        jul # "\slash " # aug,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.104",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 10 15:38:24 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Rue:2009:CMB,
  author =       "Rachel Rue and Shari Lawrence Pfleeger",
  title =        "Cybersecurity: Making the Best Use of Cybersecurity
                 Economic Models",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "4",
  pages =        "52--60",
  month =        jul # "\slash " # aug,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.98",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 10 15:38:24 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Kaufman:2009:IAD,
  author =       "Lori M. Kaufman",
  title =        "It All Depends: Data Security in the World of Cloud
                 Computing",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "4",
  pages =        "61--64",
  month =        jul # "\slash " # aug,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.87",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 10 15:38:24 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Hagen:2009:EHR,
  author =       "Janne Hagen",
  title =        "Education: Human Relationships: a Never-Ending
                 Security Education Challenge?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "4",
  pages =        "65--67",
  month =        jul # "\slash " # aug,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.92",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 10 15:38:24 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Masiello:2009:PID,
  author =       "Betsy Masiello",
  title =        "Privacy Interests: Deconstructing the Privacy
                 Experience",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "4",
  pages =        "68--70",
  month =        jul # "\slash " # aug,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.88",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 10 15:38:24 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Troutman:2009:CCGa,
  author =       "Justin Troutman and Vincent Rijmen",
  title =        "Crypto Corner: Green Cryptography: Cleaner Engineering
                 through Recycling",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "4",
  pages =        "71--73",
  month =        jul # "\slash " # aug,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.91",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 10 15:38:24 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Henning:2009:BTP,
  author =       "Ronda Henning",
  title =        "Basic Training: Predictable Surprises",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "4",
  pages =        "74--76",
  month =        jul # "\slash " # aug,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.101",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 10 15:38:24 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Traynor:2009:SSS,
  author =       "Patrick Traynor",
  title =        "Secure Systems: Securing Cellular Infrastructure:
                 Challenges and Opportunities",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "4",
  pages =        "77--79",
  month =        jul # "\slash " # aug,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.103",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 10 15:38:24 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{MacKie-Mason:2009:SPE,
  author =       "Jeffrey K. MacKie-Mason",
  title =        "Security {\&} Privacy Economics: Incentive-Centered
                 Design for Security",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "4",
  pages =        "80--83",
  month =        jul # "\slash " # aug,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.94",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 10 15:38:24 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Steingruebl:2009:BSS,
  author =       "Andy Steingruebl and Gunnar Peterson",
  title =        "Building Security In: Software Assumptions Lead to
                 Preventable Errors",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "4",
  pages =        "84--87",
  month =        jul # "\slash " # aug,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.107",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 10 15:38:24 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Schneier:2009:CTS,
  author =       "Bruce Schneier",
  title =        "Clear Text: Security, Group Size, and the Human
                 Brain",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "4",
  pages =        "88--88",
  month =        jul # "\slash " # aug,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.105",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 10 15:38:24 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Michael:2009:ECS,
  author =       "Bret Michael",
  title =        "From the Editors: In Clouds Shall We Trust?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "5",
  pages =        "3--3",
  month =        sep # "\slash " # oct,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.124",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Oct 14 17:01:10 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{McGraw:2009:ISBd,
  author =       "Gary McGraw",
  title =        "Interview: {Silver Bullet} Talks with {Bob Blakley}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "5",
  pages =        "5--8",
  month =        sep # "\slash " # oct,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.136",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Oct 14 17:01:10 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Figueroa:2009:NBc,
  author =       "James Figueroa",
  title =        "News Briefs",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "5",
  pages =        "9--10",
  month =        sep # "\slash " # oct,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.128",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Oct 14 17:01:10 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Massey:2009:SDN,
  author =       "Daniel Massey and Dorothy E. Denning",
  title =        "Securing the {Domain Name System}: {Guest Editors}'
                 Introduction",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "5",
  pages =        "11--13",
  month =        sep # "\slash " # oct,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.121",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Oct 14 17:01:10 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Avramopoulos:2009:PDR,
  author =       "Ioannis Avramopoulos and Martin Suchara",
  title =        "Protecting the {DNS} from Routing Attacks: Two
                 Alternative Anycast Implementations",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "5",
  pages =        "14--20",
  month =        sep # "\slash " # oct,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.131",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Oct 14 17:01:10 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{McGrath:2009:PIF,
  author =       "D. Kevin McGrath and Andrew Kalafut and Minaxi Gupta",
  title =        "Phishing Infrastructure Fluxes All the Way",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "5",
  pages =        "21--28",
  month =        sep # "\slash " # oct,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.130",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Oct 14 17:01:10 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Chandramouli:2009:OIS,
  author =       "Ramaswamy Chandramouli and Scott Rose",
  title =        "Open Issues in Secure {DNS} Deployment",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "5",
  pages =        "29--35",
  month =        sep # "\slash " # oct,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.129",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Oct 14 17:01:10 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Wijngaards:2009:SDE,
  author =       "Wouter C. A. Wijngaards and Benno J. Overeinder",
  title =        "Securing {DNS}: Extending {DNS} Servers with a
                 {DNSSEC} Validator",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "5",
  pages =        "36--43",
  month =        sep # "\slash " # oct,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.133",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Oct 14 17:01:10 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Osterweil:2009:ICM,
  author =       "Eric Osterweil and Lixia Zhang",
  title =        "Interadministrative Challenges in Managing {DNSKEYs}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "5",
  pages =        "44--51",
  month =        sep # "\slash " # oct,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.126",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Oct 14 17:01:10 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Nance:2009:ETT,
  author =       "Kara Nance",
  title =        "Education: Teach Them When They Aren't Looking:
                 Introducing Security in {CS1}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "5",
  pages =        "53--55",
  month =        sep # "\slash " # oct,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.139",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Oct 14 17:01:10 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Charney:2009:HEO,
  author =       "Scott Charney",
  title =        "On the Horizon: The Evolution of Online Identity",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "5",
  pages =        "56--59",
  month =        sep # "\slash " # oct,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.140",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Oct 14 17:01:10 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Cate:2009:PIS,
  author =       "Fred H. Cate",
  title =        "Privacy Interests: Security, Privacy, and the Role of
                 Law",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "5",
  pages =        "60--63",
  month =        sep # "\slash " # oct,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.135",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Oct 14 17:01:10 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Troutman:2009:CCGb,
  author =       "Justin Troutman and Vincent Rijmen",
  title =        "Crypto Corner: Green Cryptography: Cleaner Engineering
                 through Recycling, Part 2",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "5",
  pages =        "64--65",
  month =        sep # "\slash " # oct,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.120",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Oct 14 17:01:10 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Howard:2009:BTM,
  author =       "Michael Howard",
  title =        "Basic Training: Managing the Security Wall of Data",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "5",
  pages =        "66--68",
  month =        sep # "\slash " # oct,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.127",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Oct 14 17:01:10 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Zanero:2009:ATW,
  author =       "Stefano Zanero",
  title =        "Attack Trends: Wireless Malware Propagation: a Reality
                 Check",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "5",
  pages =        "70--74",
  month =        sep # "\slash " # oct,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.142",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Oct 14 17:01:10 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Blaze:2009:SST,
  author =       "Matt Blaze",
  title =        "Secure Systems: Taking Surveillance Out of the
                 Shadows",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "5",
  pages =        "75--77",
  month =        sep # "\slash " # oct,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.138",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Oct 14 17:01:10 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Lesk:2009:SPEb,
  author =       "Michael Lesk",
  title =        "Security {\&} Privacy Economics: Incentives to
                 Innovate: Improve the Past or Break with It?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "5",
  pages =        "78--81",
  month =        sep # "\slash " # oct,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.125",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Oct 14 17:01:10 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Gardner:2009:BSP,
  author =       "Ryan W. Gardner and Matt Bishop and Tadayoshi Kohno",
  title =        "Building Security In: Are Patched Machines Really
                 Fixed?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "5",
  pages =        "82--85",
  month =        sep # "\slash " # oct,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.116",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Oct 14 17:01:10 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Geer:2009:GMR,
  author =       "Daniel E. {Geer, Jr.} and Daniel G. Conway",
  title =        "For Good Measure: Risk Concentration",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "5",
  pages =        "86--87",
  month =        sep # "\slash " # oct,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.132",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Oct 14 17:01:10 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Bellovin:2009:CTS,
  author =       "Steven M. Bellovin and Daniel G. Conway",
  title =        "Clear Text: Security as a Systems Property",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "5",
  pages =        "88--88",
  month =        sep # "\slash " # oct,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.134",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Oct 14 17:01:10 MDT 2009",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Schneider:2009:LS,
  author =       "Fred B. Schneider",
  title =        "Labeling-in Security",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "6",
  pages =        "3",
  month =        nov # "\slash " # dec,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.180",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu May 13 09:49:48 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{McGraw:2009:ISBe,
  author =       "Gary McGraw",
  title =        "Interview: {Silver Bullet} Talks with {Fred
                 Schneider}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "6",
  pages =        "5--7",
  month =        nov # "\slash " # dec,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.166",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu May 13 09:49:48 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Figueroa:2009:NBd,
  author =       "James Figueroa",
  title =        "News Briefs",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "6",
  pages =        "8--9",
  month =        nov # "\slash " # dec,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.162",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu May 13 09:49:48 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Pfleeger:2009:AIT,
  author =       "Shari Lawrence Pfleeger and Salvatore J. Stolfo",
  title =        "Addressing the Insider Threat",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "6",
  pages =        "10--13",
  month =        nov # "\slash " # dec,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.146",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu May 13 09:49:48 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Caputo:2009:DIT,
  author =       "Deanna Caputo and Marcus Maloof and Gregory Stephens",
  title =        "Detecting Insider Theft of Trade Secrets",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "6",
  pages =        "14--21",
  month =        nov # "\slash " # dec,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.110",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu May 13 09:49:48 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Duran:2009:BSI,
  author =       "Felicia Duran and Stephen H. Conrad and Gregory N.
                 Conrad and David P. Duggan and Edward Bruce Held",
  title =        "Building a System for Insider Security",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "6",
  pages =        "30--38",
  month =        nov # "\slash " # dec,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.111",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu May 13 09:49:48 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Bowen:2009:DHN,
  author =       "Brian Bowen and Malek Ben Salem and Shlomo Hershkop
                 and Angelos Keromytis and Salvatore Stolfo",
  title =        "Designing Host and Network Sensors to Mitigate the
                 Insider Threat",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "6",
  pages =        "22--29",
  month =        nov # "\slash " # dec,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.109",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu May 13 09:49:48 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Drimer:2009:FTP,
  author =       "Saar Drimer and Steven J. Murdoch and Ross Anderson",
  title =        "Failures of Tamper-Proofing in {PIN} Entry Devices",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "6",
  pages =        "39--45",
  month =        nov # "\slash " # dec,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.187",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu May 13 09:49:48 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Bier:2009:RRI,
  author =       "Eric Bier and Richard Chow and Philippe Golle and
                 Tracy Holloway King and Jessica Staddon",
  title =        "The Rules of Redaction: Identify, Protect, Review (and
                 Repeat)",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "6",
  pages =        "46--53",
  month =        nov # "\slash " # dec,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.183",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu May 13 09:49:48 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Potter:2009:HTT,
  author =       "Bruce Potter",
  title =        "High Time for Trusted Computing",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "6",
  pages =        "54--56",
  month =        nov # "\slash " # dec,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.156",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu May 13 09:49:48 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Goldstein:2009:DCS,
  author =       "Adam Goldstein and David Bucciero",
  title =        "The {Dartmouth Cyber Security Initiative}: Faculty,
                 Staff, and Students Work Together",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "6",
  pages =        "57--59",
  month =        nov # "\slash " # dec,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.169",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu May 13 09:49:48 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Saydjari:2009:TTC,
  author =       "O. Sami Saydjari and Cynthia E. Irvine",
  title =        "A Tale of Three Cyber-Defense Workshops",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "6",
  pages =        "60--64",
  month =        nov # "\slash " # dec,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.171",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu May 13 09:49:48 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Lawson:2009:SCA,
  author =       "Nate Lawson",
  title =        "Side-Channel Attacks on Cryptographic Software",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "6",
  pages =        "65--68",
  month =        nov # "\slash " # dec,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.165",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu May 13 09:49:48 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Ford:2009:MSG,
  author =       "Richard Ford and William H. Allen",
  title =        "Malware Shall Greatly Increase \ldots{}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "6",
  pages =        "69--71",
  month =        nov # "\slash " # dec,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.181",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu May 13 09:49:48 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Callegati:2009:FL,
  author =       "Franco Callegati and Marco Ramilli",
  title =        "Frightened by Links",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "6",
  pages =        "72--76",
  month =        nov # "\slash " # dec,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.177",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu May 13 09:49:48 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Locasto:2009:BDR,
  author =       "Michael E. Locasto and Sergey Bratus and Brian
                 Schulte",
  title =        "Bickering In-Depth: Rethinking the Composition of
                 Competing Security Systems",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "6",
  pages =        "77--81",
  month =        nov # "\slash " # dec,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.189",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu May 13 09:49:48 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Acquisti:2009:NPB,
  author =       "Alessandro Acquisti",
  title =        "Nudging Privacy: The Behavioral Economics of Personal
                 Information",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "6",
  pages =        "82--85",
  month =        nov # "\slash " # dec,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.163",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu May 13 09:49:48 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Geer:2009:PGP,
  author =       "Daniel E. {Geer, Jr.} and Daniel G. Conway",
  title =        "Patch Grief with Proverbs",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "6",
  pages =        "86--87",
  month =        nov # "\slash " # dec,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.164",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu May 13 09:49:48 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Geer:2009:DDS,
  author =       "Daniel E. {Geer, Jr.}",
  title =        "Deskilling Digital Security",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "6",
  pages =        "88",
  month =        nov # "\slash " # dec,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.151",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu May 13 09:49:48 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2009:AI,
  author =       "Anonymous",
  title =        "Annual Index",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "7",
  number =       "6",
  pages =        "1",
  month =        nov # "\slash " # dec,
  year =         "2009",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.184",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu May 13 09:49:48 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Landwehr:2010:DL,
  author =       "Carl E. Landwehr",
  title =        "Drawing the Line",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "1",
  pages =        "3--4",
  month =        jan # "\slash " # feb,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.35",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu May 13 09:49:48 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Figueroa:2010:NBa,
  author =       "James Figueroa",
  title =        "News Briefs",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "1",
  pages =        "6--7",
  month =        jan # "\slash " # feb,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.42",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu May 13 09:49:48 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{McGraw:2010:ISBa,
  author =       "Gary McGraw",
  title =        "Interview: {Silver Bullet} Talks with {Christofer
                 Hoff}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "1",
  pages =        "8--10",
  month =        jan # "\slash " # feb,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.48",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu May 13 09:49:48 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Lisovich:2010:IPI,
  author =       "Mikhail A. Lisovich and Deirdre K. Mulligan and
                 Stephen B. Wicker",
  title =        "Inferring Personal Information from Demand-Response
                 Systems",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "1",
  pages =        "11--20",
  month =        jan # "\slash " # feb,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.40",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu May 13 09:49:48 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anton:2010:HIU,
  author =       "Annie I. Anton and Julia B. Earp and Jessica D.
                 Young",
  title =        "How {Internet} Users' Privacy Concerns Have Evolved
                 since 2002",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "1",
  pages =        "21--27",
  month =        jan # "\slash " # feb,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.38",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu May 13 09:49:48 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Strembeck:2010:SDR,
  author =       "Mark Strembeck",
  title =        "Scenario-Driven Role Engineering",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "1",
  pages =        "28--35",
  month =        jan # "\slash " # feb,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.46",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu May 13 09:49:48 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Andoh-Baidoo:2010:HIS,
  author =       "Francis Kofi Andoh-Baidoo and Kwasi Amoako-Gyampah and
                 Kweku-Muata Osei-Bryson",
  title =        "How {Internet} Security Breaches Harm Market Value",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "1",
  pages =        "36--42",
  month =        jan # "\slash " # feb,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.37",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu May 13 09:49:48 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Hansson:2010:AMV,
  author =       "Jorgen Hansson and Lutz Wrage and Peter H. Feiler and
                 John Morley and Bruce Lewis and Jerome Hugues",
  title =        "Architectural Modeling to Verify Security and
                 Nonfunctional Behavior",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "1",
  pages =        "43--49",
  month =        jan # "\slash " # feb,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.143",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu May 13 09:49:48 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Kaufman:2010:CTE,
  author =       "Lori M. Kaufman",
  title =        "Can a Trusted Environment Provide Security?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "1",
  pages =        "50--52",
  month =        jan # "\slash " # feb,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.33",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu May 13 09:49:48 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Bohme:2010:IWL,
  author =       "Rainer Bohme and Tyler Moore",
  title =        "The Iterated Weakest Link",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "1",
  pages =        "53--55",
  month =        jan # "\slash " # feb,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.51",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu May 13 09:49:48 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Irvine:2010:CCN,
  author =       "Cynthia E. Irvine and Charles C. Palmer",
  title =        "Call in the {Cyber National Guard}!",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "1",
  pages =        "56--59",
  month =        jan # "\slash " # feb,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.32",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu May 13 09:49:48 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Cohen:2010:SG,
  author =       "Fred Cohen",
  title =        "The Smarter Grid",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "1",
  pages =        "60--63",
  month =        jan # "\slash " # feb,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.52",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu May 13 09:49:48 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Michiels:2010:OWB,
  author =       "Wil Michiels",
  title =        "Opportunities in White-Box Cryptography",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "1",
  pages =        "64--67",
  month =        jan # "\slash " # feb,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.44",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu May 13 09:49:48 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Ford:2010:BBB,
  author =       "Richard Ford and Deborah A. Frincke",
  title =        "Building a Better Boot Camp",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "1",
  pages =        "68--71",
  month =        jan # "\slash " # feb,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.31",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu May 13 09:49:48 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Fabro:2010:NGL,
  author =       "Mark Fabro and Tim Roxey and Michael Assante",
  title =        "No Grid Left Behind",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "1",
  pages =        "72--76",
  month =        jan # "\slash " # feb,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.43",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu May 13 09:49:48 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Jaeger:2010:OCC,
  author =       "Trent Jaeger and Joshua Schiffman",
  title =        "Outlook: Cloudy with a Chance of Security Challenges
                 and Improvements",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "1",
  pages =        "77--80",
  month =        jan # "\slash " # feb,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.45",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu May 13 09:49:48 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Khurana:2010:SGS,
  author =       "Himanshu Khurana and Mark Hadley and Ning Lu and
                 Deborah A. Frincke",
  title =        "Smart-Grid Security Issues",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "1",
  pages =        "81--85",
  month =        jan # "\slash " # feb,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.49",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu May 13 09:49:48 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Geer:2010:LSH,
  author =       "Daniel E. {Geer, Jr.} and Daniel G. Conway",
  title =        "A Life Is Short, a Half-Life Is Forever",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "1",
  pages =        "86--87",
  month =        jan # "\slash " # feb,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.29",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu May 13 09:49:48 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Schneier:2010:SFC,
  author =       "Bruce Schneier",
  title =        "Security and Function Creep",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "1",
  pages =        "88",
  month =        jan # "\slash " # feb,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.47",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu May 13 09:49:48 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Donner:2010:IB,
  author =       "Marc Donner",
  title =        "International Blues",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "2",
  pages =        "3",
  month =        mar # "\slash " # apr,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.73",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu May 13 09:49:48 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{McGraw:2010:ISBb,
  author =       "Gary McGraw",
  title =        "Interview: {Silver Bullet} Talks with {Gillian
                 Hayes}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "2",
  pages =        "5--7",
  month =        mar # "\slash " # apr,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.80",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu May 13 09:49:48 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Figueroa:2010:NBb,
  author =       "James Figueroa",
  title =        "News Briefs",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "2",
  pages =        "8--10",
  month =        mar # "\slash " # apr,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.78",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu May 13 09:49:48 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Viega:2010:GEI,
  author =       "John Viega and Bret Michael",
  title =        "{Guest Editors}' Introduction: Mobile Device
                 Security",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "2",
  pages =        "11--12",
  month =        mar # "\slash " # apr,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.76",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu May 13 09:49:48 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Ribalda:2010:MBS,
  author =       "Ricardo Ribalda and Guillermo Gonzalez de Rivera and
                 Angel de Castro and Javier Garrido",
  title =        "A Mobile Biometric System-on-Token System for Signing
                 Digital Transactions",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "2",
  pages =        "13--19",
  month =        mar # "\slash " # apr,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.1",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu May 13 09:49:48 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Dunning:2010:TBB,
  author =       "John Paul Dunning",
  title =        "Taming the Blue Beast: a Survey of {Bluetooth} Based
                 Threats",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "2",
  pages =        "20--27",
  month =        mar # "\slash " # apr,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.3",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu May 13 09:49:48 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Lu:2010:MSC,
  author =       "H. Karen Lu and Asad M. Ali",
  title =        "Making Smart Cards Truly Portable",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "2",
  pages =        "28--34",
  month =        mar # "\slash " # apr,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.56",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu May 13 09:49:48 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Shabtai:2010:GAC,
  author =       "Asaf Shabtai and Yuval Fledel and Uri Kanonov and
                 Yuval Elovici and Shlomi Dolev and Chanan Glezer",
  title =        "{Google Android}: a Comprehensive Security
                 Assessment",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "2",
  pages =        "35--44",
  month =        mar # "\slash " # apr,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.2",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu May 13 09:49:48 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Sorge:2010:LRC,
  author =       "Christoph Sorge and Saverio Niccolini and Jan
                 Seedorf",
  title =        "The Legal Ramifications of Call-Filtering Solutions",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "2",
  pages =        "45--50",
  month =        mar # "\slash " # apr,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.54",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu May 13 09:49:48 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Potter:2010:MIY,
  author =       "Bruce Potter",
  title =        "My Information, Your Code",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "2",
  pages =        "51--53",
  month =        mar # "\slash " # apr,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.77",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu May 13 09:49:48 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Bishop:2010:CSP,
  author =       "Matt Bishop",
  title =        "A Clinic for {``Secure''} Programming",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "2",
  pages =        "54--56",
  month =        mar # "\slash " # apr,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.62",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu May 13 09:49:48 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Blumenthal:2010:HSC,
  author =       "Marjory S. Blumenthal",
  title =        "Hide and Seek in the Cloud",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "2",
  pages =        "57--58",
  month =        mar # "\slash " # apr,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.70",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu May 13 09:49:48 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Cate:2010:LNC,
  author =       "Fred H. Cate",
  title =        "The Limits of Notice and Choice",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "2",
  pages =        "59--62",
  month =        mar # "\slash " # apr,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.84",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu May 13 09:49:48 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Pfleeger:2010:CJD,
  author =       "Charles P. Pfleeger",
  title =        "Crypto: Not Just for the Defensive Team",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "2",
  pages =        "63--66",
  month =        mar # "\slash " # apr,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.65",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu May 13 09:49:48 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Matwyshyn:2010:ESV,
  author =       "Andrea M. Matwyshyn and Ang Cui and Angelos D.
                 Keromytis and Salvatore J. Stolfo",
  title =        "Ethics in Security Vulnerability Research",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "2",
  pages =        "67--72",
  month =        mar # "\slash " # apr,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.67",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu May 13 09:49:48 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Ramilli:2010:ASN,
  author =       "Marco Ramilli and Marco Prandini",
  title =        "Always the Same, Never the Same",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "2",
  pages =        "73--75",
  month =        mar # "\slash " # apr,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.64",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu May 13 09:49:48 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Keromytis:2010:VIS,
  author =       "Angelos D. Keromytis",
  title =        "{Voice-over-IP} Security: Research and Practice",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "2",
  pages =        "76--78",
  month =        mar # "\slash " # apr,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.87",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu May 13 09:49:48 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Halderman:2010:SSC,
  author =       "J. Alex Halderman",
  title =        "To Strengthen Security, Change Developers'
                 Incentives",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "2",
  pages =        "79--82",
  month =        mar # "\slash " # apr,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.85",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu May 13 09:49:48 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{McGovern:2010:QDC,
  author =       "James McGovern and Gunnar Peterson",
  title =        "10 Quick, Dirty, and Cheap Things to Improve
                 Enterprise Security",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "2",
  pages =        "83--85",
  month =        mar # "\slash " # apr,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.61",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu May 13 09:49:48 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Geer:2010:NVN,
  author =       "Daniel E. {Geer, Jr.} and Daniel G. Conway",
  title =        "Nothing Ventured, Nothing Gained",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "2",
  pages =        "86--87",
  month =        mar # "\slash " # apr,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.79",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu May 13 09:49:48 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Bellovin:2010:IS,
  author =       "Steven M. Bellovin",
  title =        "Identity and Security",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "2",
  pages =        "88",
  month =        mar # "\slash " # apr,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.71",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu May 13 09:49:48 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Michaels:2010:BLS,
  author =       "Bret Michaels",
  title =        "Balancing Liberty, Stability, and Security",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "3",
  pages =        "3",
  month =        may # "\slash " # jun,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.93",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 26 15:44:06 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{McGraw:2010:ISBc,
  author =       "Gary McGraw",
  title =        "Interview: {Silver Bullet} Talks with {Steven Kent}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "3",
  pages =        "5--9",
  month =        may # "\slash " # jun,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.104",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 26 15:44:06 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Paulson:2010:NBa,
  author =       "Linda Dailey Paulson",
  title =        "News Briefs",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "3",
  pages =        "11--13",
  month =        may # "\slash " # jun,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.102",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 26 15:44:06 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Williams:2010:PPN,
  author =       "Laurie Williams and Andrew Meneely and Grant Shipley",
  title =        "Protection Poker: The New Software Security
                 {``Game''}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "3",
  pages =        "14--20",
  month =        may # "\slash " # jun,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.58",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 26 15:44:06 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Hole:2010:TRA,
  author =       "Kjell Hole and Lars-Helge Netland",
  title =        "Toward Risk Assessment of Large-Impact and Rare
                 Events",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "3",
  pages =        "21--27",
  month =        may # "\slash " # jun,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.55",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 26 15:44:06 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Cook:2010:SDS,
  author =       "Ian P. Cook and Shari Lawrence Pfleeger",
  title =        "Security Decision Support Challenges in Data
                 Collection and Use",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "3",
  pages =        "28--35",
  month =        may # "\slash " # jun,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.59",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 26 15:44:06 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Shabtai:2010:SAP,
  author =       "Asaf Shabtai and Yuval Fledel and Yuval Elovici",
  title =        "Securing {Android}-Powered Mobile Devices Using
                 {SELinux}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "3",
  pages =        "36--44",
  month =        may # "\slash " # jun,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2009.144",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 26 15:44:06 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Kshetri:2010:ECF,
  author =       "Nir Kshetri",
  title =        "The Economics of Click Fraud",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "3",
  pages =        "45--53",
  month =        may # "\slash " # jun,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.88",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 26 15:44:06 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Potter:2010:TO,
  author =       "Bruce Potter",
  title =        "Thinking Operationally",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "3",
  pages =        "54--55",
  month =        may # "\slash " # jun,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.109",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 26 15:44:06 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Talbot:2010:DC,
  author =       "Edward B. Talbot and Deborah Frincke and Matt Bishop",
  title =        "Demythifying Cybersecurity",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "3",
  pages =        "56--59",
  month =        may # "\slash " # jun,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.95",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 26 15:44:06 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Cohen:2010:VS,
  author =       "Fred Cohen",
  title =        "The Virtualization Solution",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "3",
  pages =        "60--63",
  month =        may # "\slash " # jun,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.108",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 26 15:44:06 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{ElEmam:2010:RBI,
  author =       "Khaled {El Emam}",
  title =        "Risk-Based De-Identification of Health Data",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "3",
  pages =        "64--67",
  month =        may # "\slash " # jun,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.103",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 26 15:44:06 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Martin:2010:XMA,
  author =       "Luther Martin",
  title =        "{XTS}: a Mode of {AES} for Encrypting Hard Disks",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "3",
  pages =        "68--69",
  month =        may # "\slash " # jun,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.111",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 26 15:44:06 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Kellerman:2010:CTP,
  author =       "Tom Kellerman",
  title =        "Cyber-Threat Proliferation: Today's Truly Pervasive
                 Global Epidemic",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "3",
  pages =        "70--73",
  month =        may # "\slash " # jun,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.94",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 26 15:44:06 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Giffin:2010:NMB,
  author =       "Jon Giffin",
  title =        "The Next Malware Battleground: Recovery After Unknown
                 Infection",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "3",
  pages =        "74--76",
  month =        may # "\slash " # jun,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.107",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 26 15:44:06 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Lesk:2010:SCN,
  author =       "Michael Lesk",
  title =        "Son of {Carterfone}: Network Neutrality or
                 Regulation?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "3",
  pages =        "77--82",
  month =        may # "\slash " # jun,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.105",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 26 15:44:06 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Steven:2010:TM,
  author =       "John Steven",
  title =        "Threat Modeling",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "3",
  pages =        "83--86",
  month =        may # "\slash " # jun,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.110",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 26 15:44:06 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Geer:2010:F,
  author =       "Daniel E. {Geer, Jr.}",
  title =        "Fratricide",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "3",
  pages =        "88, 87",
  month =        may # "\slash " # jun,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.97",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 26 15:44:06 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Schneider:2010:FFA,
  author =       "Fred B. Schneider",
  title =        "Fumbling the Future, Again",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "4",
  pages =        "3",
  month =        jul # "\slash " # aug,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.126",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 27 16:38:19 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{McGraw:2010:ISBd,
  author =       "Gary McGraw",
  title =        "Interview: {Silver Bullet} Talks with {Richard
                 Clarke}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "4",
  pages =        "5--11",
  month =        jul # "\slash " # aug,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.136",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 27 16:38:19 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Paulson:2010:NBb,
  author =       "Linda Dailey Paulson",
  title =        "News Briefs",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "4",
  pages =        "12--14",
  month =        jul # "\slash " # aug,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.133",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 27 16:38:19 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Stolfo:2010:PPS,
  author =       "Salvatore J. Stolfo and Gene Tsudik",
  title =        "Privacy-Preserving Sharing of Sensitive Information",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "4",
  pages =        "16--17",
  month =        jul # "\slash " # aug,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.135",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 27 16:38:19 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{DeCristofaro:2010:SLI,
  author =       "Emiliano {De Cristofaro} and Jihye Kim",
  title =        "Some Like It Private: Sharing Confidential Information
                 Based on Oblivious Authorization",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "4",
  pages =        "18--24",
  month =        jul # "\slash " # aug,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.91",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 27 16:38:19 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Kagal:2010:PPB,
  author =       "Lalana Kagal and Joe Pato",
  title =        "Preserving Privacy Based on Semantic Policy Tools",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "4",
  pages =        "25--30",
  month =        jul # "\slash " # aug,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.89",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 27 16:38:19 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Claffy:2010:DPU,
  author =       "Kc Claffy and Erin Kenneally",
  title =        "Dialing Privacy and Utility: a Proposed Data-Sharing
                 Framework to Advance {Internet} Research",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "4",
  pages =        "31--39",
  month =        jul # "\slash " # aug,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.57",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 27 16:38:19 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Moran:2010:PMP,
  author =       "Tal Moran and Tyler Moore",
  title =        "The {Phish-Market Protocol}: Secure Sharing Between
                 Competitors",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "4",
  pages =        "40--45",
  month =        jul # "\slash " # aug,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.138",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 27 16:38:19 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Pfleeger:2010:WMS,
  author =       "Shari Pfleeger and Robert Cunningham",
  title =        "Why Measuring Security Is Hard",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "4",
  pages =        "46--54",
  month =        jul # "\slash " # aug,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.60",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 27 16:38:19 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Kaufman:2010:CPC,
  author =       "Lori M. Kaufman",
  title =        "Can Public-Cloud Security Meet Its Unique
                 Challenges?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "4",
  pages =        "55--57",
  month =        jul # "\slash " # aug,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.120",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 27 16:38:19 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Irvine:2010:ESS,
  author =       "Cynthia Irvine and Thuy D. Nguyen",
  title =        "Educating the Systems Security Engineer's Apprentice",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "4",
  pages =        "58--61",
  month =        jul # "\slash " # aug,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.123",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 27 16:38:19 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Varadharajan:2010:IF,
  author =       "Vijay Varadharajan",
  title =        "{Internet} Filtering",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "4",
  pages =        "62--65",
  month =        jul # "\slash " # aug,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.131",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 27 16:38:19 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Cachin:2010:EKS,
  author =       "Christian Cachin and Jan Camenisch",
  title =        "Encrypting Keys Securely",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "4",
  pages =        "66--69",
  month =        jul # "\slash " # aug,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.124",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 27 16:38:19 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Bilar:2010:DST,
  author =       "Daniel Bilar",
  title =        "Degradation and Subversion through Subsystem Attacks",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "4",
  pages =        "70--73",
  month =        jul # "\slash " # aug,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.122",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 27 16:38:19 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Sinclair:2010:WWA,
  author =       "Sara Sinclair and Sean W. Smith",
  title =        "What's Wrong with Access Control in the Real World?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "4",
  pages =        "74--77",
  month =        jul # "\slash " # aug,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.139",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 27 16:38:19 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Edelman:2010:LCA,
  author =       "Benjamin Edelman",
  title =        "Least-Cost Avoiders in Online Fraud and Abuse",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "4",
  pages =        "78--81",
  month =        jul # "\slash " # aug,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.132",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 27 16:38:19 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Chuvakin:2010:HDA,
  author =       "Anton Chuvakin and Gunnar Peterson",
  title =        "How to Do Application Logging Right",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "4",
  pages =        "82--85",
  month =        jul # "\slash " # aug,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.127",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 27 16:38:19 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Geer:2010:TR,
  author =       "Daniel E. {Geer, Jr.}",
  title =        "A Time to Rethink",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "4",
  pages =        "86--87",
  month =        jul # "\slash " # aug,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.119",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 27 16:38:19 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Schneier:2010:TSN,
  author =       "Bruce Schneier",
  title =        "A Taxonomy of Social Networking Data",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "4",
  pages =        "88",
  month =        jul # "\slash " # aug,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.118",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 27 16:38:19 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Donner:2010:PC,
  author =       "Marc Donner",
  title =        "Phagocytes in Cyberspace",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "5",
  pages =        "3--4",
  month =        sep # "\slash " # oct,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.161",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Oct 21 08:11:10 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{McGraw:2010:ISBe,
  author =       "Gary McGraw",
  title =        "Interview: {Silver Bullet} Talks with {Greg
                 Morrisett}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "5",
  pages =        "6--9",
  month =        sep # "\slash " # oct,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.163",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Oct 21 08:11:10 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Lawton:2010:NBa,
  author =       "George Lawton",
  title =        "News Briefs",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "5",
  pages =        "10--11",
  month =        sep # "\slash " # oct,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.158",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Oct 21 08:11:10 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Chillarege:2010:GEI,
  author =       "Ram Chillarege and Jeffrey Voas",
  title =        "{Guest Editors}' Introduction: Reliability of Embedded
                 and Cyber-Physical Systems",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "5",
  pages =        "12--13",
  month =        sep # "\slash " # oct,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.152",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Oct 21 08:11:10 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Wu:2010:KSP,
  author =       "Hui Jun Wu",
  title =        "Kernel Service Protection for Client Security",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "5",
  pages =        "14--19",
  month =        sep # "\slash " # oct,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.112",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Oct 21 08:11:10 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Kenny:2010:ESA,
  author =       "J. Ryan Kenny and Craig Robinson",
  title =        "Embedded Software Assurance for Configuring Secure
                 Hardware",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "5",
  pages =        "20--26",
  month =        sep # "\slash " # oct,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.150",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Oct 21 08:11:10 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Barnum:2010:RRE,
  author =       "Sean Barnum and Shankar Sastry and John A. Stankovic",
  title =        "Roundtable: Reliability of Embedded and Cyber-Physical
                 Systems",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "5",
  pages =        "27--32",
  month =        sep # "\slash " # oct,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.162",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Oct 21 08:11:10 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Butler:2010:NSA,
  author =       "Kevin Butler and Steve McLaughlin and Thomas Moyer and
                 Patrick McDaniel",
  title =        "New Security Architectures Based on Emerging Disk
                 Functionality",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "5",
  pages =        "34--41",
  month =        sep # "\slash " # oct,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.90",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Oct 21 08:11:10 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Abu-Nimeh:2010:PDB,
  author =       "Saeed Abu-Nimeh and Thomas Chen",
  title =        "Proliferation and Detection of Blog Spam",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "5",
  pages =        "42--47",
  month =        sep # "\slash " # oct,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.113",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Oct 21 08:11:10 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Visaggio:2010:SMV,
  author =       "Corrado Visaggio",
  title =        "Session Management Vulnerabilities in Today's {Web}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "5",
  pages =        "48--56",
  month =        sep # "\slash " # oct,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.114",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Oct 21 08:11:10 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Potter:2010:NS,
  author =       "Bruce Potter",
  title =        "Necessary but Not Sufficient",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "5",
  pages =        "57--58",
  month =        sep # "\slash " # oct,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.157",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Oct 21 08:11:10 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{White:2010:CNH,
  author =       "Gregory B. White and Dwayne Williams and Keith
                 Harrison",
  title =        "The {CyberPatriot National High School Cyber Defense
                 Competition}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "5",
  pages =        "59--61",
  month =        sep # "\slash " # oct,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.166",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Oct 21 08:11:10 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Cohen:2010:ACS,
  author =       "Fred Cohen",
  title =        "Automated Control System Security",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "5",
  pages =        "62--63",
  month =        sep # "\slash " # oct,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.146",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Oct 21 08:11:10 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Bruening:2010:DTN,
  author =       "Paula J. Bruening and K. Krasnow Waterman",
  title =        "Data Tagging for New Information Governance Models",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "5",
  pages =        "64--68",
  month =        sep # "\slash " # oct,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.147",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Oct 21 08:11:10 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Furon:2010:TPC,
  author =       "Teddy Furon and Gwenael Doerr",
  title =        "Tracing Pirated Content on the {Internet}: Unwinding
                 {Ariadne}'s Thread",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "5",
  pages =        "69--71",
  month =        sep # "\slash " # oct,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.167",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Oct 21 08:11:10 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Bishop:2010:TTT,
  author =       "Matt Bishop",
  title =        "Technology, Training, and Transformation",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "5",
  pages =        "72--75",
  month =        sep # "\slash " # oct,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.165",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Oct 21 08:11:10 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{McDaniel:2010:GEW,
  author =       "Patrick McDaniel and William Enck",
  title =        "Not So Great Expectations: Why Application Markets
                 Haven't Failed Security",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "5",
  pages =        "76--78",
  month =        sep # "\slash " # oct,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.159",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Oct 21 08:11:10 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Lesk:2010:DLE,
  author =       "Michael Lesk",
  title =        "Do the {Luddites} Ever Win?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "5",
  pages =        "79--82",
  month =        sep # "\slash " # oct,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.148",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Oct 21 08:11:10 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Peterson:2010:DTV,
  author =       "Gunnar Peterson",
  title =        "Don't Trust. And Verify: a Security Architecture Stack
                 for the Cloud",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "5",
  pages =        "83--86",
  month =        sep # "\slash " # oct,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.149",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Oct 21 08:11:10 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Bellovin:2010:PR,
  author =       "Steven M. Bellovin",
  title =        "Perceptions and Reality",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "5",
  pages =        "88, 87",
  month =        sep # "\slash " # oct,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.160",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Oct 21 08:11:10 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Landwehr:2010:S,
  author =       "Carl E. Landwehr",
  title =        "Sailing Away!",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "6",
  pages =        "3--4",
  month =        nov # "\slash " # dec,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.184",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Dec 15 15:02:36 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Schell:2010:MPK,
  author =       "Roger Schell and Steve Lipner and Mary Ellen Zurko and
                 Elaine R. Palmer and David Safford and Charles C.
                 Palmer and Carl E. Landwehr",
  title =        "In Memoriam: {Paul Karger}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "6",
  pages =        "5",
  month =        nov # "\slash " # dec,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.179",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Dec 15 15:02:36 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Lawton:2010:NBb,
  author =       "George Lawton",
  title =        "News Briefs",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "6",
  pages =        "7--8",
  month =        nov # "\slash " # dec,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.170",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Dec 15 15:02:36 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{McGraw:2010:SBT,
  author =       "Gary McGraw",
  title =        "Silver Bullet Talks with {Ivan Arce}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "6",
  pages =        "9--13",
  month =        nov # "\slash " # dec,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.188",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Dec 15 15:02:36 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Ghosh:2010:GEI,
  author =       "Anup Ghosh and Ivan Arce",
  title =        "{Guest Editors}' Introduction: In Cloud Computing We
                 Trust --- But Should We?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "6",
  pages =        "14--16",
  month =        nov # "\slash " # dec,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.177",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Dec 15 15:02:36 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Grosse:2010:CCR,
  author =       "Eric Grosse and John Howie and James Ransome and Jim
                 Reavis and Steve Schmidt",
  title =        "Cloud Computing Roundtable",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "6",
  pages =        "17--23",
  month =        nov # "\slash " # dec,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.173",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Dec 15 15:02:36 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Takabi:2010:SPC,
  author =       "Hassan Takabi and James B. D. Joshi and Gail-Joon
                 Ahn",
  title =        "Security and Privacy Challenges in Cloud Computing
                 Environments",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "6",
  pages =        "24--31",
  month =        nov # "\slash " # dec,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.186",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Dec 15 15:02:36 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Pauley:2010:CPT,
  author =       "Wayne Pauley",
  title =        "Cloud Provider Transparency: An Empirical Evaluation",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "6",
  pages =        "32--39",
  month =        nov # "\slash " # dec,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.140",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Dec 15 15:02:36 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Harnik:2010:SCC,
  author =       "Danny Harnik and Benny Pinkas and Alexandra
                 Shulman-Peleg",
  title =        "Side Channels in Cloud Services: Deduplication in
                 Cloud Storage",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "6",
  pages =        "40--47",
  month =        nov # "\slash " # dec,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.187",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Dec 15 15:02:36 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Calero:2010:TMT,
  author =       "Jose M. Alcaraz Calero and Nigel Edwards and Johannes
                 Kirschnick and Lawrence Wilcock and Mike Wray",
  title =        "Toward a Multi-Tenancy Authorization System for Cloud
                 Services",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "6",
  pages =        "48--55",
  month =        nov # "\slash " # dec,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.194",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Dec 15 15:02:36 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Liu:2010:VMF,
  author =       "Qian Liu and Chuliang Weng and Minglu Li and Yuan
                 Luo",
  title =        "An In-{VM} Measuring Framework for Increasing Virtual
                 Machine Security in Clouds",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "6",
  pages =        "56--62",
  month =        nov # "\slash " # dec,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.143",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Dec 15 15:02:36 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Clark:2010:NPI,
  author =       "Paul C. Clark and Glenn R. Cook and Edward L. Fisher
                 and John D. Fulp and Valerie Linhoff and Cynthia E.
                 Irvine",
  title =        "New Pathways in Identity Management",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "6",
  pages =        "64--67",
  month =        nov # "\slash " # dec,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.183",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Dec 15 15:02:36 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Cate:2010:GAP,
  author =       "Fred H. Cate",
  title =        "Government Access to Private-Sector Data",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "6",
  pages =        "68--71",
  month =        nov # "\slash " # dec,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.176",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Dec 15 15:02:36 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Daemen:2010:FYA,
  author =       "Joan Daemen and Vincent Rijmen",
  title =        "The First 10 Years of Advanced Encryption",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "6",
  pages =        "72--74",
  month =        nov # "\slash " # dec,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.193",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Dec 15 15:02:36 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Mayron:2010:SMC,
  author =       "Liam M. Mayron",
  title =        "Secure Multimedia Communications",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "6",
  pages =        "76--79",
  month =        nov # "\slash " # dec,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.185",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Dec 15 15:02:36 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Prandini:2010:SHS,
  author =       "Marco Prandini and Marco Ramilli and Walter Cerroni
                 and Franco Callegati",
  title =        "Splitting the {HTTPS} Stream to Attack Secure {Web}
                 Connections",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "6",
  pages =        "80--84",
  month =        nov # "\slash " # dec,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.190",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Dec 15 15:02:36 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Datta:2010:LMS,
  author =       "Anupam Datta",
  title =        "Logical Methods in Security and Privacy",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "6",
  pages =        "86--89",
  month =        nov # "\slash " # dec,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.180",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Dec 15 15:02:36 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Camp:2010:IMM,
  author =       "Jean Camp",
  title =        "Identity Management's Misaligned Incentives",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "6",
  pages =        "90--94",
  month =        nov # "\slash " # dec,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.178",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Dec 15 15:02:36 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Geer:2010:IC,
  author =       "Daniel E. {Geer, Jr.}",
  title =        "An Index of Cybersecurity",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "8",
  number =       "6",
  pages =        "96, 95",
  month =        nov # "\slash " # dec,
  year =         "2010",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.171",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Dec 15 15:02:36 2010",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Viega:2011:RC,
  author =       "John Viega",
  title =        "Reality Check",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "1",
  pages =        "3--4",
  month =        jan # "\slash " # feb,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.17",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Feb 8 15:50:31 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2011:RT,
  author =       "Anonymous",
  title =        "2010 Reviewer Thanks",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "1",
  pages =        "5--6",
  month =        jan # "\slash " # feb,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.3",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Feb 8 15:50:31 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{McGraw:2011:ISBa,
  author =       "Gary McGraw",
  title =        "Interview: {Silver Bullet} Talks with {Paul Kocher}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "1",
  pages =        "8--11",
  month =        jan # "\slash " # feb,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.18",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Feb 8 15:50:31 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Vigna:2011:ICF,
  author =       "Giovanni Vigna",
  title =        "The {2010 International Capture the Flag
                 Competition}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "1",
  pages =        "12--14",
  month =        jan # "\slash " # feb,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.21",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Feb 8 15:50:31 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Garber:2011:NBa,
  author =       "Lee Garber",
  title =        "News Briefs",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "1",
  pages =        "15--17",
  month =        jan # "\slash " # feb,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.16",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Feb 8 15:50:31 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Irvine:2011:GEI,
  author =       "Cynthia Irvine and J. R. Rao",
  title =        "{Guest Editors}' Introduction: Engineering Secure
                 Systems",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "1",
  pages =        "18--21",
  month =        jan # "\slash " # feb,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.10",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Feb 8 15:50:31 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Karger:2011:LLB,
  author =       "Paul Karger and Suzanne McIntosh and Elaine Palmer and
                 David Toll and Samuel Weber",
  title =        "Lessons Learned: Building the {Caernarvon}
                 High-Assurance Operating System",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "1",
  pages =        "22--30",
  month =        jan # "\slash " # feb,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.169",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Feb 8 15:50:31 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Weissman:2011:LLB,
  author =       "Clark Weissman and Timothy Levin",
  title =        "Lessons Learned from Building a High-Assurance Crypto
                 Gateway",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "1",
  pages =        "31--39",
  month =        jan # "\slash " # feb,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.201",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Feb 8 15:50:31 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Schiffman:2011:NBR,
  author =       "Joshua Schiffman and Thomas Moyer and Trent Jaeger and
                 Patrick McDaniel",
  title =        "Network-Based Root of Trust for Installation",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "1",
  pages =        "40--48",
  month =        jan # "\slash " # feb,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.15",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Feb 8 15:50:31 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Johnson:2011:AIR,
  author =       "M. Eric Johnson and Shari Pfleeger",
  title =        "Addressing Information Risk in Turbulent Times",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "1",
  pages =        "49--57",
  month =        jan # "\slash " # feb,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.116",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Feb 8 15:50:31 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Alexander:2011:DT,
  author =       "James Alexander and Jonathan Smith",
  title =        "Disinformation: a Taxonomy",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "1",
  pages =        "58--63",
  month =        jan # "\slash " # feb,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.141",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Feb 8 15:50:31 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Stone-Gross:2011:ABT,
  author =       "Brett Stone-Gross and Marco Cova and Bob Gilbert and
                 Richard Kemmerer and Christopher Kruegel and Giovanni
                 Vigna",
  title =        "Analysis of a Botnet Takeover",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "1",
  pages =        "64--72",
  month =        jan # "\slash " # feb,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.144",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Feb 8 15:50:31 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Kaufman:2011:HPI,
  author =       "Lori M. Kaufman",
  title =        "How Private Is the {Internet}?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "1",
  pages =        "73--75",
  month =        jan # "\slash " # feb,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.11",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Feb 8 15:50:31 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Cate:2011:TCP,
  author =       "Fred H. Cate",
  title =        "A Transatlantic Convergence on Privacy?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "1",
  pages =        "76--79",
  month =        jan # "\slash " # feb,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.5",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Feb 8 15:50:31 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Stevens:2011:MPD,
  author =       "Didier Stevens",
  title =        "Malicious {PDF} Documents Explained",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "1",
  pages =        "80--82",
  month =        jan # "\slash " # feb,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.14",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Feb 8 15:50:31 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Seltzer:2011:EFC,
  author =       "Wendy Seltzer",
  title =        "Exposing the Flaws of Censorship by Domain Name",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "1",
  pages =        "83--87",
  month =        jan # "\slash " # feb,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.8",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Feb 8 15:50:31 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Lesk:2011:WIW,
  author =       "Michael Lesk",
  title =        "What Is Information Worth?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "1",
  pages =        "88--90",
  month =        jan # "\slash " # feb,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.23",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Feb 8 15:50:31 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Bejtlich:2011:DID,
  author =       "Richard Bejtlich and John Steven and Gunnar Peterson",
  title =        "Directions in Incident Detection and Response",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "1",
  pages =        "91--92",
  month =        jan # "\slash " # feb,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.6",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Feb 8 15:50:31 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Geer:2011:DRT,
  author =       "Daniel E. {Geer, Jr.}",
  title =        "Does a Rising Tide Lift All Boats?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "1",
  pages =        "93--94",
  month =        jan # "\slash " # feb,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.7",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Feb 8 15:50:31 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Geer:2011:TC,
  author =       "Daniel E. {Geer, Jr.}",
  title =        "A Time for Choosing",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "1",
  pages =        "96, 95",
  month =        jan # "\slash " # feb,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.4",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Feb 8 15:50:31 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Donner:2011:PSL,
  author =       "Marc Donner",
  title =        "Privacy and the System Life Cycle",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "2",
  pages =        "3",
  month =        mar # "\slash " # apr,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.35",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Apr 1 22:34:08 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Garber:2011:NBb,
  author =       "Lee Garber",
  title =        "News Briefs",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "2",
  pages =        "5--7",
  month =        mar # "\slash " # apr,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.34",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Apr 1 22:34:08 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{McGraw:2011:ISBb,
  author =       "Gary McGraw",
  title =        "Interview: {Silver Bullet} Talks with {David Rice}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "2",
  pages =        "8--11",
  month =        mar # "\slash " # apr,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.38",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Apr 1 22:34:08 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Theofanos:2011:GEI,
  author =       "Mary Frances Theofanos and Shari Lawrence Pfleeger",
  title =        "{Guest Editors}' Introduction: Shouldn't All Security
                 Be Usable?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "2",
  pages =        "12--17",
  month =        mar # "\slash " # apr,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.30",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Apr 1 22:34:08 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Bravo-Lillo:2011:BGC,
  author =       "Cristian Bravo-Lillo and Lorrie Faith Cranor and Julie
                 Downs and Saranga Komanduri",
  title =        "Bridging the Gap in Computer Security Warnings: a
                 Mental Model Approach",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "2",
  pages =        "18--26",
  month =        mar # "\slash " # apr,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.198",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Apr 1 22:34:08 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Fuglerud:2011:SIA,
  author =       "Kristin Fuglerud and {\O}ystein Dale",
  title =        "Secure and Inclusive Authentication with a Talking
                 Mobile One-Time-Password Client",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "2",
  pages =        "27--34",
  month =        mar # "\slash " # apr,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.204",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Apr 1 22:34:08 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Johnson:2011:UFH,
  author =       "M. Eric Johnson and Nicholas D. Willey",
  title =        "Usability Failures and Healthcare Data Hemorrhages",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "2",
  pages =        "35--42",
  month =        mar # "\slash " # apr,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.196",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Apr 1 22:34:08 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Reeder:2011:WPD,
  author =       "Robert W. Reeder and Stuart Schechter",
  title =        "When the Password Doesn't Work: Secondary
                 Authentication for {Websites}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "2",
  pages =        "43--49",
  month =        mar # "\slash " # apr,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.1",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Apr 1 22:34:08 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Grobauer:2011:UCC,
  author =       "Bernd Grobauer and Tobias Walloschek and Elmar
                 Stocker",
  title =        "Understanding Cloud Computing Vulnerabilities",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "2",
  pages =        "50--57",
  month =        mar # "\slash " # apr,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.115",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Apr 1 22:34:08 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Fenz:2011:VVE,
  author =       "Stefan Fenz and Andreas Ekelhart",
  title =        "Verification, Validation, and Evaluation in
                 Information Security Risk Management",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "2",
  pages =        "58--65",
  month =        mar # "\slash " # apr,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.117",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Apr 1 22:34:08 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Spring:2011:MCCa,
  author =       "Jonathan Spring",
  title =        "Monitoring Cloud Computing by Layer, Part 1",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "2",
  pages =        "66--68",
  month =        mar # "\slash " # apr,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.33",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Apr 1 22:34:08 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Bishop:2011:TSS,
  author =       "Matt Bishop",
  title =        "Teaching Security Stealthily",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "2",
  pages =        "69--71",
  month =        mar # "\slash " # apr,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.43",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Apr 1 22:34:08 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Bayuk:2011:SSE,
  author =       "Jennifer L. Bayuk",
  title =        "Systems Security Engineering",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "2",
  pages =        "72--74",
  month =        mar # "\slash " # apr,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.41",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Apr 1 22:34:08 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Chabanne:2011:SPE,
  author =       "Herve Chabanne and Mehdi Tibouchi",
  title =        "Securing {E}-passports with Elliptic Curves",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "2",
  pages =        "75--78",
  month =        mar # "\slash " # apr,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.37",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Apr 1 22:34:08 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Greamo:2011:SVM,
  author =       "Chris Greamo and Anup Ghosh",
  title =        "Sandboxing and Virtualization: Modern Tools for
                 Combating Malware",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "2",
  pages =        "79--82",
  month =        mar # "\slash " # apr,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.36",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Apr 1 22:34:08 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{McDaniel:2011:DPS,
  author =       "Patrick McDaniel",
  title =        "Data Provenance and Security",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "2",
  pages =        "83--85",
  month =        mar # "\slash " # apr,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.27",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Apr 1 22:34:08 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Raskin:2011:YLE,
  author =       "Aza Raskin",
  title =        "Your Life Experiences, Brought to You by {Budweiser}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "2",
  pages =        "86--88",
  month =        mar # "\slash " # apr,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.45",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Apr 1 22:34:08 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Chess:2011:SSP,
  author =       "Brian Chess and Brad Arkin",
  title =        "Software Security in Practice",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "2",
  pages =        "89--92",
  month =        mar # "\slash " # apr,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.40",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Apr 1 22:34:08 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Geer:2011:CC,
  author =       "Daniel E. {Geer, Jr.}",
  title =        "Correlation Is Not Causation",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "2",
  pages =        "93--94",
  month =        mar # "\slash " # apr,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.26",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Apr 1 22:34:08 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Schneier:2011:DC,
  author =       "Bruce Schneier",
  title =        "Detecting Cheaters",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "2",
  pages =        "96, 95",
  month =        mar # "\slash " # apr,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.28",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Apr 1 22:34:08 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Bloomfield:2011:RU,
  author =       "Robin E. Bloomfield",
  title =        "Resilient to the Unexpected",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "3",
  pages =        "3--4",
  month =        may # "\slash " # jun,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.62",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 25 15:29:11 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Garber:2011:NBc,
  author =       "Lee Garber",
  title =        "News Briefs",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "3",
  pages =        "6--8",
  month =        may # "\slash " # jun,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.60",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 25 15:29:11 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{McGraw:2011:SBT,
  author =       "Gary McGraw",
  title =        "{Silver Bullet} Talks with {Ralph Langner}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "3",
  pages =        "9--14",
  month =        may # "\slash " # jun,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.66",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 25 15:29:11 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Evans:2011:GEI,
  author =       "David Evans and Sal Stolfo",
  title =        "{Guest Editors}' Introduction: The Science of
                 Security",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "3",
  pages =        "16--17",
  month =        may # "\slash " # jun,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.50",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 25 15:29:11 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Bau:2011:SMA,
  author =       "Jason Bau and John C. Mitchell",
  title =        "Security Modeling and Analysis",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "3",
  pages =        "18--25",
  month =        may # "\slash " # jun,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.2",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 25 15:29:11 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Datta:2011:AMC,
  author =       "Anupam Datta and Jason Franklin and Deepak Garg and
                 Limin Jia and Dilsun Kaynar",
  title =        "On Adversary Models and Compositional Security",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "3",
  pages =        "26--32",
  month =        may # "\slash " # jun,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.203",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 25 15:29:11 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Degabriele:2011:PSR,
  author =       "Jean Paul Degabriele and Kenny Paterson and Gaven J.
                 Watson",
  title =        "Provable Security in the Real World",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "3",
  pages =        "33--41",
  month =        may # "\slash " # jun,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.200",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 25 15:29:11 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Barrera:2011:SSI,
  author =       "David Barrera and Paul {Van Oorschot}",
  title =        "Secure Software Installation on Smartphones",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "3",
  pages =        "42--48",
  month =        may # "\slash " # jun,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.202",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 25 15:29:11 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Langner:2011:SDC,
  author =       "Ralph Langner",
  title =        "{Stuxnet}: Dissecting a Cyberwarfare Weapon",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "3",
  pages =        "49--51",
  month =        may # "\slash " # jun,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.67",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 25 15:29:11 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Spring:2011:MCCb,
  author =       "Jonathan Spring",
  title =        "Monitoring Cloud Computing by Layer, Part 2",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "3",
  pages =        "52--55",
  month =        may # "\slash " # jun,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.57",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 25 15:29:11 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Conti:2011:HCT,
  author =       "Gregory Conti and Thomas Babbitt and John Nelson",
  title =        "Hacking Competitions and Their Untapped Potential for
                 Security Education",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "3",
  pages =        "56--59",
  month =        may # "\slash " # jun,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.51",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 25 15:29:11 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Stolfo:2011:MS,
  author =       "Sal Stolfo and Steven M. Bellovin and David Evans",
  title =        "Measuring Security",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "3",
  pages =        "60--65",
  month =        may # "\slash " # jun,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.56",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 25 15:29:11 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Schwartz:2011:PEA,
  author =       "Paul M. Schwartz",
  title =        "Privacy, Ethics, and Analytics",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "3",
  pages =        "66--69",
  month =        may # "\slash " # jun,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.61",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 25 15:29:11 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Grigg:2011:CCN,
  author =       "Ian Grigg and Peter Gutmann",
  title =        "The Curse of Cryptographic Numerology",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "3",
  pages =        "70--72",
  month =        may # "\slash " # jun,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.69",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 25 15:29:11 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Heelan:2011:VDS,
  author =       "Sean Heelan",
  title =        "Vulnerability Detection Systems: Think Cyborg, Not
                 Robot",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "3",
  pages =        "74--77",
  month =        may # "\slash " # jun,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.70",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 25 15:29:11 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Lesk:2011:SSB,
  author =       "Michael Lesk",
  title =        "Salmon, Songs, and Blankets: Creativity on the
                 {Northwest Coast}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "3",
  pages =        "78--81",
  month =        may # "\slash " # jun,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.65",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 25 15:29:11 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Arkin:2011:NWC,
  author =       "Brad Arkin",
  title =        "Never Waste a Crisis",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "3",
  pages =        "82--85",
  month =        may # "\slash " # jun,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.58",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 25 15:29:11 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Geer:2011:NM,
  author =       "Daniel E. {Geer, Jr.}",
  title =        "New Measures",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "3",
  pages =        "86--87",
  month =        may # "\slash " # jun,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.59",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 25 15:29:11 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Bellovin:2011:CBS,
  author =       "Steven M. Bellovin",
  title =        "Clouds from Both Sides",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "3",
  pages =        "88",
  month =        may # "\slash " # jun,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.48",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 25 15:29:11 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Schneider:2011:DT,
  author =       "Fred B. Schneider and Deirdre K. Mulligan",
  title =        "A Doctrinal Thesis",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "4",
  pages =        "3--4",
  month =        jul # "\slash " # aug,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.76",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 17 15:55:37 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Garber:2011:NBd,
  author =       "Lee Garber",
  title =        "News Briefs",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "4",
  pages =        "6--8",
  month =        jul # "\slash " # aug,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.86",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 17 15:55:37 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{McGraw:2011:ISBc,
  author =       "Gary McGraw",
  title =        "Interview: {Silver Bullet} Talks with {John Savage}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "4",
  pages =        "9--12",
  month =        jul # "\slash " # aug,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.93",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 17 15:55:37 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Hively:2011:TST,
  author =       "Lee Hively and Frederick Sheldon and Anna Cinzia
                 Squicciarini",
  title =        "Toward Scalable Trustworthy Computing Using the
                 Human-Physiology-Immunity Metaphor",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "4",
  pages =        "14--23",
  month =        jul # "\slash " # aug,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.142",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 17 15:55:37 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Nguyen:2011:CIT,
  author =       "Quyen L. Nguyen and Arun Sood",
  title =        "A Comparison of Intrusion-Tolerant System
                 Architectures",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "4",
  pages =        "24--31",
  month =        jul # "\slash " # aug,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.145",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 17 15:55:37 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Dittrich:2011:BAC,
  author =       "David Dittrich and Michael Bailey and Sven Dietrich",
  title =        "Building an Active Computer Security Ethics
                 Community",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "4",
  pages =        "32--40",
  month =        jul # "\slash " # aug,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2010.199",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 17 15:55:37 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Dhillon:2011:DDT,
  author =       "Danny Dhillon",
  title =        "Developer-Driven Threat Modeling: Lessons Learned in
                 the Trenches",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "4",
  pages =        "41--47",
  month =        jul # "\slash " # aug,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.47",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 17 15:55:37 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Conti:2011:EKM,
  author =       "Gregory Conti and James Caroland",
  title =        "Embracing the {Kobayashi Maru}: Why You Should Teach
                 Your Students to Cheat",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "4",
  pages =        "48--51",
  month =        jul # "\slash " # aug,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.80",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 17 15:55:37 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Trcek:2011:TMP,
  author =       "Denis Tr{\v{c}}ek",
  title =        "Trust Management in the Pervasive Computing Era",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "4",
  pages =        "52--55",
  month =        jul # "\slash " # aug,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.95",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 17 15:55:37 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Fidler:2011:WSA,
  author =       "David P. Fidler",
  title =        "Was {Stuxnet} an Act of War? Decoding a Cyberattack",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "4",
  pages =        "56--59",
  month =        jul # "\slash " # aug,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.96",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 17 15:55:37 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Smith:2011:RBA,
  author =       "Sean W. Smith",
  title =        "Room at the Bottom: Authenticated Encryption on Slow
                 Legacy Networks",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "4",
  pages =        "60--63",
  month =        jul # "\slash " # aug,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.89",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 17 15:55:37 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Whalen:2011:SIP,
  author =       "Tara Whalen",
  title =        "Security as if People Mattered",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "4",
  pages =        "64--67",
  month =        jul # "\slash " # aug,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.92",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 17 15:55:37 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Miller:2011:MAD,
  author =       "Charlie Miller",
  title =        "Mobile Attacks and Defense",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "4",
  pages =        "68--70",
  month =        jul # "\slash " # aug,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.85",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 17 15:55:37 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Locasto:2011:FBD,
  author =       "Michael E. Locasto and Matthew C. Little",
  title =        "A Failure-Based Discipline of Trustworthy Information
                 Systems",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "4",
  pages =        "71--75",
  month =        jul # "\slash " # aug,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.77",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 17 15:55:37 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Lesk:2011:RPP,
  author =       "Michael Lesk",
  title =        "Reading: From Paper to Pixels",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "4",
  pages =        "76--79",
  month =        jul # "\slash " # aug,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.87",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 17 15:55:37 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Diamant:2011:RSA,
  author =       "John Diamant",
  title =        "Resilient Security Architecture: a Complementary
                 Approach to Reducing Vulnerabilities",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "4",
  pages =        "80--84",
  month =        jul # "\slash " # aug,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.88",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 17 15:55:37 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Geer:2011:ASI,
  author =       "Daniel E. {Geer, Jr.}",
  title =        "Attack Surface Inflation",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "4",
  pages =        "85--86",
  month =        jul # "\slash " # aug,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.78",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 17 15:55:37 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Geer:2011:ER,
  author =       "Daniel E. {Geer, Jr.}",
  title =        "{Eisenhower} Revisited",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "4",
  pages =        "88, 87",
  month =        jul # "\slash " # aug,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.79",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 17 15:55:37 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Viega:2011:TYT,
  author =       "John Viega",
  title =        "Ten Years of Trustworthy Computing: Lessons Learned",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "5",
  pages =        "3--4",
  month =        sep # "\slash " # oct,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.143",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 29 11:31:41 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Garber:2011:NBe,
  author =       "Lee Garber",
  title =        "News Briefs",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "5",
  pages =        "6--8",
  month =        sep # "\slash " # oct,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.137",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 29 11:31:41 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{McGraw:2011:ISBd,
  author =       "Gary McGraw",
  title =        "Interview: {Silver Bullet} Talks with {Elinor Mills}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "5",
  pages =        "9--12",
  month =        sep # "\slash " # oct,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.140",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 29 11:31:41 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Berson:2011:C,
  author =       "Thomas A. Berson and Dorothy E. Denning",
  title =        "Cyberwarfare",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "5",
  pages =        "13--15",
  month =        sep # "\slash " # oct,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.132",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 29 11:31:41 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Applegate:2011:CPH,
  author =       "Scott D. Applegate",
  title =        "Cybermilitias and Political Hackers: Use of Irregular
                 Forces in Cyberwarfare",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "5",
  pages =        "16--22",
  month =        sep # "\slash " # oct,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.46",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 29 11:31:41 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Lewis:2011:CTE,
  author =       "James A. Lewis",
  title =        "Cyberwar Thresholds and Effects",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "5",
  pages =        "23--29",
  month =        sep # "\slash " # oct,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.25",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 29 11:31:41 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Parks:2011:PC,
  author =       "Raymond C. Parks and David P. Duggan",
  title =        "Principles of Cyberwarfare",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "5",
  pages =        "30--35",
  month =        sep # "\slash " # oct,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.138",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 29 11:31:41 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Elliott:2011:DSC,
  author =       "David Elliott",
  title =        "Deterring Strategic Cyberattack",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "5",
  pages =        "36--40",
  month =        sep # "\slash " # oct,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.24",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 29 11:31:41 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{OKane:2011:OHM,
  author =       "Philip O'Kane and Sakir Sezer and Kieran McLaughlin",
  title =        "Obfuscation: The Hidden Malware",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "5",
  pages =        "41--47",
  month =        sep # "\slash " # oct,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.98",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 29 11:31:41 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Gunter:2011:EBA,
  author =       "Carl A. Gunter and David M. Liebovitz and Bradley
                 Malin",
  title =        "Experience-Based Access Management: a Life-Cycle
                 Framework for Identity and Access Management Systems",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "5",
  pages =        "48--55",
  month =        sep # "\slash " # oct,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.72",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 29 11:31:41 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Beyah:2011:RAP,
  author =       "Raheem Beyah and Aravind Venkataraman",
  title =        "Rogue-Access-Point Detection: Challenges, Solutions,
                 and Future Directions",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "5",
  pages =        "56--61",
  month =        sep # "\slash " # oct,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.75",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 29 11:31:41 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Han:2011:TDE,
  author =       "ShuiHua Han and Chao-Hsien Chu and Zongwei Luo",
  title =        "Tamper Detection in the {EPC} Network Using Digital
                 Watermarking",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "5",
  pages =        "62--69",
  month =        sep # "\slash " # oct,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.71",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 29 11:31:41 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Du:2011:SHL,
  author =       "Wenliang Du",
  title =        "{SEED}: Hands-On Lab Exercises for Computer Security
                 Education",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "5",
  pages =        "70--73",
  month =        sep # "\slash " # oct,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.139",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 29 11:31:41 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Cox:2011:TC,
  author =       "Landon P. Cox",
  title =        "Truth in Crowdsourcing",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "5",
  pages =        "74--76",
  month =        sep # "\slash " # oct,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.145",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 29 11:31:41 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{MacKie-Mason:2011:ASW,
  author =       "Jeffrey MacKie-Mason",
  title =        "All Space Will Be Public Space",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "5",
  pages =        "77--80",
  month =        sep # "\slash " # oct,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.131",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 29 11:31:41 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{DeFigueiredo:2011:CMT,
  author =       "Dimitri DeFigueiredo",
  title =        "The Case for Mobile Two-Factor Authentication",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "5",
  pages =        "81--85",
  month =        sep # "\slash " # oct,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.144",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 29 11:31:41 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Geer:2011:WBE,
  author =       "Daniel E. {Geer, Jr.} and Peter Kuper",
  title =        "When \$80 Billion Is Not Enough",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "5",
  pages =        "86--87",
  month =        sep # "\slash " # oct,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.146",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 29 11:31:41 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Schneier:2011:ES,
  author =       "Bruce Schneier",
  title =        "Empathy and Security",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "5",
  pages =        "88--88",
  month =        sep # "\slash " # oct,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.133",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 29 11:31:41 MDT 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Donner:2011:IC,
  author =       "Marc Donner",
  title =        "The Invisible Computers",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "6",
  pages =        "3",
  month =        nov # "\slash " # dec,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.176",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Dec 9 13:58:58 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{McGraw:2011:ISBe,
  author =       "Gary McGraw",
  title =        "Interview: {Silver Bullet} Talks with {Halvar Flake}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "6",
  pages =        "5--8",
  month =        nov # "\slash " # dec,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.173",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Dec 9 13:58:58 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Garber:2011:NBf,
  author =       "Lee Garber",
  title =        "News Briefs",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "6",
  pages =        "9--11",
  month =        nov # "\slash " # dec,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.169",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Dec 9 13:58:58 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Arbaugh:2011:LI,
  author =       "William Arbaugh and Deborah A. Frincke",
  title =        "Living with Insecurity",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "6",
  pages =        "12--13",
  month =        nov # "\slash " # dec,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.166",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Dec 9 13:58:58 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Heckle:2011:SDH,
  author =       "Rosa R. Heckle",
  title =        "Security Dilemma: Healthcare Clinicians at Work",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "6",
  pages =        "14--19",
  month =        nov # "\slash " # dec,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.74",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Dec 9 13:58:58 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Liu:2011:SRM,
  author =       "Debin Liu and Ninghui Li and XiaoFeng Wang and L. Jean
                 Camp",
  title =        "Security Risk Management Using Incentives",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "6",
  pages =        "20--28",
  month =        nov # "\slash " # dec,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.99",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Dec 9 13:58:58 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Villamor:2011:HUD,
  author =       "Antonio Manuel Fernandez Villamor and Antonio Manuel
                 Fernandez Villamor and Juan Yelmo and Juan C. Yelmo",
  title =        "Helping Users Deal with Digital Threats: The {Online
                 User Supervision Architecture}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "6",
  pages =        "29--35",
  month =        nov # "\slash " # dec,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.73",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Dec 9 13:58:58 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Cheung:2011:SCI,
  author =       "Steven Cheung",
  title =        "Securing Collaborative Intrusion Detection Systems",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "6",
  pages =        "36--42",
  month =        nov # "\slash " # dec,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.97",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Dec 9 13:58:58 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Garfinkel:2011:ODS,
  author =       "Simson L. Garfinkel and George Dinolt",
  title =        "Operations with Degraded Security",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "6",
  pages =        "43--48",
  month =        nov # "\slash " # dec,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.149",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Dec 9 13:58:58 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Weis:2011:SDS,
  author =       "Joel Weis and Jim Alves-Foss",
  title =        "Securing Database as a Service: Issues and
                 Compromises",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "6",
  pages =        "49--55",
  month =        nov # "\slash " # dec,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.127",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Dec 9 13:58:58 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Kaaniche:2011:IAD,
  author =       "Mohamed Kaaniche and Aad van Moorsel",
  title =        "It All Depends, and Increasingly So",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "6",
  pages =        "56--57",
  month =        nov # "\slash " # dec,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.165",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Dec 9 13:58:58 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Irvine:2011:VCF,
  author =       "Cynthia Irvine",
  title =        "The Value of Capture-the-Flag Exercises in Education:
                 An Interview with {Chris Eagle}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "6",
  pages =        "58--60",
  month =        nov # "\slash " # dec,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.177",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Dec 9 13:58:58 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Whalen:2011:MDL,
  author =       "Tara Whalen",
  title =        "Mobile Devices and Location Privacy: Where Do We Go
                 from Here?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "6",
  pages =        "61--62",
  month =        nov # "\slash " # dec,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.168",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Dec 9 13:58:58 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Ferguson-Boucher:2011:CCR,
  author =       "Kirsten Ferguson-Boucher",
  title =        "Cloud Computing: a Records and Information Management
                 Perspective",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "6",
  pages =        "63--66",
  month =        nov # "\slash " # dec,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.159",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Dec 9 13:58:58 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Guido:2011:CSI,
  author =       "Dan Guido",
  title =        "A Case Study of Intelligence-Driven Defense",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "6",
  pages =        "67--70",
  month =        nov # "\slash " # dec,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.158",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Dec 9 13:58:58 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Moriarty:2011:IC,
  author =       "Kathleen M. Moriarty",
  title =        "Incident Coordination",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "6",
  pages =        "71--75",
  month =        nov # "\slash " # dec,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.164",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Dec 9 13:58:58 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Lesk:2011:CE,
  author =       "Michael Lesk",
  title =        "Cybersecurity and Economics",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "6",
  pages =        "76--79",
  month =        nov # "\slash " # dec,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.160",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Dec 9 13:58:58 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Fly:2011:DFW,
  author =       "Robert Fly",
  title =        "Detecting Fraud on {Websites}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "6",
  pages =        "80--85",
  month =        nov # "\slash " # dec,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.161",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Dec 9 13:58:58 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Geer:2011:SBB,
  author =       "Daniel E. {Geer, Jr.}",
  title =        "Small Is Beautiful, Big Is Inevitable",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "6",
  pages =        "86--87",
  month =        nov # "\slash " # dec,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.174",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Dec 9 13:58:58 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Bellovin:2011:ST,
  author =       "Steven M. Bellovin",
  title =        "Security Think",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "9",
  number =       "6",
  pages =        "88",
  month =        nov # "\slash " # dec,
  year =         "2011",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.172",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Dec 9 13:58:58 2011",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Viega:2012:HA,
  author =       "John Viega",
  title =        "Happy Anniversary!",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "1",
  pages =        "3--4",
  month =        jan # "\slash " # feb,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.9",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 15 12:40:29 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Ghosh:2012:LDG,
  author =       "Anup Ghosh and Gary McGraw",
  title =        "Lost Decade or Golden Era: Computer Security since
                 9/11",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "1",
  pages =        "6--10",
  month =        jan # "\slash " # feb,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.12",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 15 12:40:29 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{McGraw:2012:ISBa,
  author =       "Gary McGraw",
  title =        "Interview: {Silver Bullet} Talks with {Deborah
                 Frincke}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "1",
  pages =        "11--14",
  month =        jan # "\slash " # feb,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.21",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 15 12:40:29 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Garber:2012:SPPa,
  author =       "Lee Garber",
  title =        "Security, Privacy, and Policy Roundup",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "1",
  pages =        "15--17",
  month =        jan # "\slash " # feb,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.20",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 15 12:40:29 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Jakobsson:2012:AWD,
  author =       "Markus Jakobsson and Richard Chow and Jesus Molina",
  title =        "Authentication --- Are We Doing Well Enough?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "1",
  pages =        "19--21",
  month =        jan # "\slash " # feb,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.5",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 15 12:40:29 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Balfanz:2012:FA,
  author =       "Dirk Balfanz and Richard Chow and Ori Eisen and Markus
                 Jakobsson and Steve Kirsch and Scott Matsumoto and
                 Jesus Molina and Paul van Oorschot",
  title =        "The Future of Authentication",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "1",
  pages =        "22--27",
  month =        jan # "\slash " # feb,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.24",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 15 12:40:29 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Herley:2012:RAA,
  author =       "Cormac Herley and Paul van Oorschot",
  title =        "A Research Agenda Acknowledging the Persistence of
                 Passwords",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "1",
  pages =        "28--36",
  month =        jan # "\slash " # feb,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.150",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 15 12:40:29 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Herzberg:2012:TJA,
  author =       "Amir Herzberg and Ronen Margulies",
  title =        "Training {Johnny} to Authenticate (Safely)",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "1",
  pages =        "37--45",
  month =        jan # "\slash " # feb,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.129",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 15 12:40:29 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Poller:2012:EIC,
  author =       "Andreas Poller and Ulrich Waldmann and Sven Vowe and
                 Sven Turpe",
  title =        "Electronic Identity Cards for User Authentication ---
                 Promise and Practice",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "1",
  pages =        "46--54",
  month =        jan # "\slash " # feb,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.148",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 15 12:40:29 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Aguirre:2012:IAS,
  author =       "Idoia Aguirre and Sergio Alonso",
  title =        "Improving the Automation of Security Information
                 Management: a Collaborative Approach",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "1",
  pages =        "55--59",
  month =        jan # "\slash " # feb,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.153",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 15 12:40:29 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Pettigrew:2012:MSS,
  author =       "James A. {Pettigrew III} and Julie J. C. H. Ryan",
  title =        "Making Successful Security Decisions: a Qualitative
                 Evaluation",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "1",
  pages =        "60--68",
  month =        jan # "\slash " # feb,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.128",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 15 12:40:29 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Arlat:2012:NSD,
  author =       "Jean Arlat and Zbigniew Kalbarczyk and Takashi Nanya",
  title =        "Nanocomputing: Small Devices, Large Dependability
                 Challenges",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "1",
  pages =        "69--72",
  month =        jan # "\slash " # feb,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.17",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 15 12:40:29 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Mirkovic:2012:TCD,
  author =       "Jelena Mirkovic and Terry Benzel",
  title =        "Teaching Cybersecurity with {DeterLab}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "1",
  pages =        "73--76",
  month =        jan # "\slash " # feb,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.23",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 15 12:40:29 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Whalen:2012:TPR,
  author =       "Tara Whalen",
  title =        "This Time, It's Personal: Recent Discussions on
                 Concepts of Personal Information",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "1",
  pages =        "77--79",
  month =        jan # "\slash " # feb,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.25",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 15 12:40:29 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Camenisch:2012:EIN,
  author =       "Jan Camenisch and Anja Lehmann and Gregory Neven",
  title =        "Electronic Identities Need Private Credentials",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "1",
  pages =        "80--83",
  month =        jan # "\slash " # feb,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.7",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 15 12:40:29 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Bailey:2012:MMM,
  author =       "Don A. Bailey",
  title =        "Moving 2 Mishap: {M2M}'s Impact on Privacy and
                 Safety",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "1",
  pages =        "84--87",
  month =        jan # "\slash " # feb,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.16",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 15 12:40:29 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Lesk:2012:YMN,
  author =       "Michael Lesk",
  title =        "Your Memory Is Now a Vendor Service",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "1",
  pages =        "88--90",
  month =        jan # "\slash " # feb,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.26",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 15 12:40:29 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Matthews:2012:OPI,
  author =       "Bronwen Matthews",
  title =        "Optimizing Product Improvement Spending with
                 Third-Party Security Consultants",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "1",
  pages =        "91--93",
  month =        jan # "\slash " # feb,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.18",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 15 12:40:29 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Geer:2012:PL,
  author =       "Daniel E. {Geer, Jr.}",
  title =        "Power. Law.",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "1",
  pages =        "94--95",
  month =        jan # "\slash " # feb,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.19",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 15 12:40:29 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Geer:2012:ML,
  author =       "Daniel E. {Geer, Jr.}",
  title =        "More or Less",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "1",
  pages =        "96",
  month =        jan # "\slash " # feb,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.15",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 15 12:40:29 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Epstein:2012:CWT,
  author =       "Jeremy Epstein",
  title =        "Can We Be Too Careful?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "2",
  pages =        "3--5",
  month =        mar # "\slash " # apr,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.33",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Apr 2 06:03:36 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Epstein:2012:RSP,
  author =       "Jeremy Epstein",
  title =        "Reflecting on Some Past Predictions",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "2",
  pages =        "7--10",
  month =        mar # "\slash " # apr,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.47",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Apr 2 06:03:36 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{McGraw:2012:ISBb,
  author =       "Gary McGraw",
  title =        "Interview: {Silver Bullet} Talks with {Neil Daswani}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "2",
  pages =        "11--14",
  month =        mar # "\slash " # apr,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.49",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Apr 2 06:03:36 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Garber:2012:SPPb,
  author =       "Lee Garber",
  title =        "Security, Privacy, and Policy Roundup",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "2",
  pages =        "15--17",
  month =        mar # "\slash " # apr,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.48",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Apr 2 06:03:36 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Pfleeger:2012:GEI,
  author =       "Shari Lawrence Pfleeger and Cynthia Irvine and Mischel
                 Kwon",
  title =        "{Guest Editors}' Introduction",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "2",
  pages =        "19--23",
  month =        mar # "\slash " # apr,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.38",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Apr 2 06:03:36 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Kirlappos:2012:SEA,
  author =       "Iacovos Kirlappos and M. Angela Sasse",
  title =        "Security Education against Phishing: a Modest Proposal
                 for a Major Rethink",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "2",
  pages =        "24--32",
  month =        mar # "\slash " # apr,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.179",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Apr 2 06:03:36 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Hoffman:2012:HBC,
  author =       "Lance J. Hoffman and Diana L. Burley and Costis
                 Toregas",
  title =        "Holistically Building the Cybersecurity Workforce",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "2",
  pages =        "33--39",
  month =        mar # "\slash " # apr,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.181",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Apr 2 06:03:36 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Furman:2012:BCT,
  author =       "Susanne M. Furman and Mary Frances Theofanos and
                 Yee-Yin Choong and Brian Stanton",
  title =        "Basing Cybersecurity Training on User Perceptions",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "2",
  pages =        "40--49",
  month =        mar # "\slash " # apr,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.180",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Apr 2 06:03:36 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Kwon:2012:ECP,
  author =       "Mischel Kwon and Michael J. Jacobs and David Cullinane
                 and Christopher G. Ipsen and James Foley",
  title =        "Educating Cyber Professionals: a View from Academia,
                 the Private Sector, and Government",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "2",
  pages =        "50--53",
  month =        mar # "\slash " # apr,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.36",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Apr 2 06:03:36 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Charney:2012:CDA,
  author =       "Scott Charney",
  title =        "Collective Defense: Applying the Public-Health Model
                 to the {Internet}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "2",
  pages =        "54--59",
  month =        mar # "\slash " # apr,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.152",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Apr 2 06:03:36 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Kumar:2012:MVA,
  author =       "Sanjeev Kumar and Sirisha Surisetty",
  title =        "{Microsoft} vs. {Apple}: Resilience against
                 Distributed Denial-of-Service Attacks",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "2",
  pages =        "60--64",
  month =        mar # "\slash " # apr,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.147",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Apr 2 06:03:36 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Neumann:2012:ISS,
  author =       "Peter G. Neumann and Ulf Lindqvist",
  title =        "The {IEEE Symposium on Security and Privacy} Is Moving
                 to {San Francisco}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "2",
  pages =        "65--66",
  month =        mar # "\slash " # apr,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.51",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Apr 2 06:03:36 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Heiser:2012:TTS,
  author =       "Gernot Heiser and Toby Murray and Gerwin Klein",
  title =        "It's Time for Trustworthy Systems",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "2",
  pages =        "67--70",
  month =        mar # "\slash " # apr,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.41",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Apr 2 06:03:36 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Bailey:2012:MR,
  author =       "Michael Bailey and David Dittrich and Erin Kenneally
                 and Doug Maughan",
  title =        "The {Menlo Report}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "2",
  pages =        "71--75",
  month =        mar # "\slash " # apr,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.52",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Apr 2 06:03:36 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Maimut:2012:LCR,
  author =       "Diana Maimut and Khaled Ouafi",
  title =        "Lightweight Cryptography for {RFID} Tags",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "2",
  pages =        "76--79",
  month =        mar # "\slash " # apr,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.43",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Apr 2 06:03:36 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Endicott-Popovsky:2012:UCD,
  author =       "Barbara Endicott-Popovsky and Donald J. Horowitz",
  title =        "Unintended Consequences: Digital Evidence in Our Legal
                 System",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "2",
  pages =        "80--83",
  month =        mar # "\slash " # apr,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.54",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Apr 2 06:03:36 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Rohlf:2012:SCC,
  author =       "Chris Rohlf and Yan Ivnitskiy",
  title =        "The Security Challenges of Client-Side Just-in-Time
                 Engines",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "2",
  pages =        "84--86",
  month =        mar # "\slash " # apr,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.53",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Apr 2 06:03:36 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Sassaman:2012:PPR,
  author =       "Len Sassaman and Meredith L. Patterson and Sergey
                 Bratus",
  title =        "A Patch for {Postel}'s {Robustness Principle}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "2",
  pages =        "87--91",
  month =        mar # "\slash " # apr,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.31",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Apr 2 06:03:36 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Cranor:2012:CUC,
  author =       "Lorrie Faith Cranor",
  title =        "Can Users Control Online Behavioral Advertising
                 Effectively?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "2",
  pages =        "93--96",
  month =        mar # "\slash " # apr,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.32",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Apr 2 06:03:36 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Fichtinger:2012:DSS,
  author =       "Barbara Fichtinger and Frances Paulisch and Peter
                 Panholzer",
  title =        "Driving Secure Software Development Experience in a
                 Diverse Product Environment",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "2",
  pages =        "97--101",
  month =        mar # "\slash " # apr,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.35",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Apr 2 06:03:36 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Geer:2012:NWH,
  author =       "Daniel E. {Geer, Jr.}",
  title =        "Numbers Worth Having",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "2",
  pages =        "102--103",
  month =        mar # "\slash " # apr,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.46",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Apr 2 06:03:36 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Schneier:2012:HCT,
  author =       "Bruce Schneier",
  title =        "How Changing Technology Affects Security",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "2",
  pages =        "104",
  month =        mar # "\slash " # apr,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.39",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Apr 2 06:03:36 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Pfleeger:2012:KC,
  author =       "Shari Lawrence Pfleeger",
  title =        "A Key to the Castle",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "3",
  pages =        "3",
  month =        may # "\slash " # jun,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.64",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Jul 27 08:24:35 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Cybenko:2012:SAM,
  author =       "George Cybenko and Carl E. Landwehr",
  title =        "Security Analytics and Measurements",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "3",
  pages =        "5--8",
  month =        may # "\slash " # jun,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.75",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Jul 27 08:24:35 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{McGraw:2012:ISBc,
  author =       "Gary McGraw",
  title =        "Interview: {Silver Bullet} Talks with {Giovanni
                 Vigna}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "3",
  pages =        "9--11",
  month =        may # "\slash " # jun,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.77",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Jul 27 08:24:35 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Garber:2012:SPPc,
  author =       "Lee Garber",
  title =        "Security, Privacy, and Policy Roundup",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "3",
  pages =        "12--13",
  month =        may # "\slash " # jun,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.76",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Jul 27 08:24:35 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Chess:2012:SAMa,
  author =       "Brian Chess and Chris Wysopal",
  title =        "Software Assurance for the Masses",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "3",
  pages =        "14--15",
  month =        may # "\slash " # jun,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.78",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Jul 27 08:24:35 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Cifuentes:2012:TPD,
  author =       "Cristina Cifuentes and Nathan Keynes and Lian Li and
                 Nathan Hawes and Manuel Valdiviezo",
  title =        "Transitioning {Parfait} into a Development Tool",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "3",
  pages =        "16--23",
  month =        may # "\slash " # jun,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.30",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Jul 27 08:24:35 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Martin:2012:SIC,
  author =       "Robert A. Martin and Steven M. Christey",
  title =        "The Software Industry's {``Clean} Water Act''
                 Alternative",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "3",
  pages =        "24--31",
  month =        may # "\slash " # jun,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.3",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Jul 27 08:24:35 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Chess:2012:SAMb,
  author =       "Brian Chess and Kris Britton and Chris Eng and Bill
                 Pugh and Lakshmikanth Raghavan and Jacob West",
  title =        "Static Analysis in Motion",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "3",
  pages =        "53--56",
  month =        may # "\slash " # jun,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.79",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Jul 27 08:24:35 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anderson:2012:MVS,
  author =       "Paul Anderson",
  title =        "Measuring the Value of Static-Analysis Tool
                 Deployments",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "3",
  pages =        "40--47",
  month =        may # "\slash " # jun,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.4",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Jul 27 08:24:35 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Renaud:2012:BNT,
  author =       "Karen Renaud",
  title =        "Blaming Noncompliance Is Too Convenient: What Really
                 Causes Information Breaches?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "3",
  pages =        "57--63",
  month =        may # "\slash " # jun,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.157",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Jul 27 08:24:35 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Amin:2012:DTM,
  author =       "Rohan M. Amin and Julie J. C. H. Ryan and Johan Rene
                 van Dorp",
  title =        "Detecting Targeted Malicious Email",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "3",
  pages =        "64--71",
  month =        may # "\slash " # jun,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.154",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Jul 27 08:24:35 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Strigini:2012:RWI,
  author =       "Lorenzo Strigini",
  title =        "Resilience: What Is It, and How Much Do We Want?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "3",
  pages =        "72--75",
  month =        may # "\slash " # jun,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.74",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Jul 27 08:24:35 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Paulsen:2012:NCC,
  author =       "Celia Paulsen and Ernest McDuffie and William Newhouse
                 and Patricia Toth",
  title =        "{NICE}: Creating a Cybersecurity Workforce and Aware
                 Public",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "3",
  pages =        "76--79",
  month =        may # "\slash " # jun,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.73",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Jul 27 08:24:35 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Handschuh:2012:HASa,
  author =       "Helena Handschuh",
  title =        "Hardware-Anchored Security Based on {SRAM PUFs}, {Part
                 1}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "3",
  pages =        "80--83",
  month =        may # "\slash " # jun,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.68",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Jul 27 08:24:35 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Lesk:2012:CR,
  author =       "Michael Lesk",
  title =        "The Clouds Roll By",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "3",
  pages =        "84--87",
  month =        may # "\slash " # jun,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.81",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Jul 27 08:24:35 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Baize:2012:DSP,
  author =       "Eric Baize",
  title =        "Developing Secure Products in the Age of Advanced
                 Persistent Threats",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "3",
  pages =        "88--92",
  month =        may # "\slash " # jun,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.65",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Jul 27 08:24:35 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Geer:2012:IU,
  author =       "Daniel E. {Geer, Jr.} and Mukul Pareek",
  title =        "{ICS} Update",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "3",
  pages =        "93--95",
  month =        may # "\slash " # jun,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.69",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Jul 27 08:24:35 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Bellovin:2012:FLW,
  author =       "Steven M. Bellovin",
  title =        "Fighting the Last War",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "3",
  pages =        "96",
  month =        may # "\slash " # jun,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.66",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Jul 27 08:24:35 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Viega:2012:CSP,
  author =       "John Viega",
  title =        "Cloud Security: Not a Problem",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "4",
  pages =        "3--3",
  month =        jul # "\slash " # aug,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.93",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 29 17:25:32 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Pfleeger:2012:SMS,
  author =       "Shari Lawrence Pfleeger",
  title =        "Security Measurement Steps, Missteps, and Next Steps",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "4",
  pages =        "5--9",
  month =        jul # "\slash " # aug,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.106",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 29 17:25:32 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Pfleeger:2012:DPM,
  author =       "Shari Lawrence Pfleeger and Marc Rogers and Masooda
                 Bashir and Kelly Caine and Deanna Caputo and Michael
                 Losavio and Sal Stolfo",
  title =        "Does Profiling Make Us More Secure?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "4",
  pages =        "10--15",
  month =        jul # "\slash " # aug,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.95",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 29 17:25:32 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Garber:2012:SPPd,
  author =       "Lee Garber",
  title =        "Security, Privacy, and Policy Roundup",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "4",
  pages =        "16--18",
  month =        jul # "\slash " # aug,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.107",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 29 17:25:32 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Nazario:2012:IIS,
  author =       "Jose Nazario and John Kristoff",
  title =        "{Internet} Infrastructure Security",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "4",
  pages =        "24--25",
  month =        jul # "\slash " # aug,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.99",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 29 17:25:32 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{AlSadeh:2012:SND,
  author =       "Ahmad AlSa'deh and Christoph Meinel",
  title =        "Secure Neighbor Discovery: Review, Challenges,
                 Perspectives, and Recommendations",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "4",
  pages =        "26--34",
  month =        jul # "\slash " # aug,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.27",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 29 17:25:32 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Dunlop:2012:BMB,
  author =       "Matthew Dunlop and Stephen Groat and William Urbanski
                 and Randy Marchany and Joseph Tront",
  title =        "The Blind Man's Bluff Approach to Security Using
                 {IPv6}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "4",
  pages =        "35--43",
  month =        jul # "\slash " # aug,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.28",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 29 17:25:32 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Garcia:2012:ERP,
  author =       "Sergio Sanchez Garcia and Ana Gomez Oliva and Emilia
                 Perez-Belleboni",
  title =        "Is {Europe} Ready for a Pan-{European} Identity
                 Management System?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "4",
  pages =        "44--49",
  month =        jul # "\slash " # aug,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.58",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 29 17:25:32 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Kallberg:2012:CCM,
  author =       "Jan Kallberg",
  title =        "The Common Criteria Meets {Realpolitik}: Trust,
                 Alliances, and Potential Betrayal",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "4",
  pages =        "50--53",
  month =        jul # "\slash " # aug,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.29",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 29 17:25:32 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Sheldon:2012:IWN,
  author =       "Frederick T. Sheldon and John Mark Weber and Seong-Moo
                 Yoo and W. David Pan",
  title =        "The Insecurity of Wireless Networks",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "4",
  pages =        "54--61",
  month =        jul # "\slash " # aug,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.60",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 29 17:25:32 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "AES (Advanced Encryption Standard); Beck--Tews attack;
                 Chopchop attack; Counter Mode Cipher Block Chaining
                 Message Authentication Code (CCMP); Halvorsen--Haugen
                 attack; Hole 196 attack; message integrity check (MIC);
                 Temporal Key Integrity Protocol (TKIP); Wi-Fi Protected
                 Access (WPA); Wi-Fi Protected Access version 2 (WPA-2);
                 Wired Equivalency Protocol (WEP)",
}

@Article{Dan:2012:CPS,
  author =       "Gyorgy Dan and Henrik Sandberg and Mathias Ekstedt and
                 Gunnar Bjorkman",
  title =        "Challenges in Power System Information Security",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "4",
  pages =        "62--70",
  month =        jul # "\slash " # aug,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.151",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 29 17:25:32 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{McGraw:2012:ISBd,
  author =       "Gary McGraw",
  title =        "Interview: {Silver Bullet} Talks with {Randy Sabett}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "4",
  pages =        "19--22",
  month =        jul # "\slash " # aug,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.108",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 29 17:25:32 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Dessiatnikoff:2012:PAO,
  author =       "Anthony Dessiatnikoff and Yves Deswarte and Eric Alata
                 and Vincent Nicomette",
  title =        "Potential Attacks on Onboard Aerospace Systems",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "4",
  pages =        "71--74",
  month =        jul # "\slash " # aug,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.104",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 29 17:25:32 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Gavas:2012:WCO,
  author =       "Efstratios Gavas and Nasir Memon and Douglas Britton",
  title =        "Winning Cybersecurity One Challenge at a Time",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "4",
  pages =        "75--79",
  month =        jul # "\slash " # aug,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.112",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 29 17:25:32 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Geer:2012:YST,
  author =       "Daniel E. Geer and Bob Blakley",
  title =        "Are You Smarter than the {TSA}? (Hint: No)",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "4",
  pages =        "94--95",
  month =        jul # "\slash " # aug,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.91",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 29 17:25:32 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Handschuh:2012:HASb,
  author =       "Helena Handschuh",
  title =        "Hardware-Anchored Security Based on {SRAM PUFs}, {Part
                 2}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "4",
  pages =        "80--81",
  month =        jul # "\slash " # aug,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.98",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 29 17:25:32 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Geer:2012:SYG,
  author =       "Daniel E. Geer and Jerry Archer",
  title =        "Stand Your Ground",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "4",
  pages =        "96",
  month =        jul # "\slash " # aug,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.109",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 29 17:25:32 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Valasek:2012:PCE,
  author =       "Chris Valasek",
  title =        "Primitive-Chaining Exploits: a Real-World Example",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "4",
  pages =        "82--84",
  month =        jul # "\slash " # aug,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.105",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 29 17:25:32 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{McDaniel:2012:BCS,
  author =       "Patrick McDaniel",
  title =        "Bloatware Comes to the Smartphone",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "4",
  pages =        "85--87",
  month =        jul # "\slash " # aug,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.92",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 29 17:25:32 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Lesk:2012:GMM,
  author =       "Michael Lesk",
  title =        "{Georgia} on My Mind",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "4",
  pages =        "88--90",
  month =        jul # "\slash " # aug,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.97",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 29 17:25:32 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Grossman:2012:SWS,
  author =       "Jeremiah Grossman",
  title =        "The State of {Website} Security",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "4",
  pages =        "91--93",
  month =        jul # "\slash " # aug,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.111",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Aug 29 17:25:32 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Bloomfield:2012:TGW,
  author =       "Robin Bloomfield",
  title =        "Are Things Getting Worse?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "5",
  pages =        "3",
  month =        sep # "\slash " # oct,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.115",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Oct 22 07:45:36 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{McGraw:2012:ISBe,
  author =       "Gary McGraw",
  title =        "Interview: {Silver Bullet} Talks with {Kay Connelly}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "5",
  pages =        "5--7",
  month =        sep # "\slash " # oct,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.130",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Oct 22 07:45:36 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Garber:2012:SPPe,
  author =       "Lee Garber",
  title =        "Security, Privacy, and Policy Roundup",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "5",
  pages =        "8--9",
  month =        sep # "\slash " # oct,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.129",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Oct 22 07:45:36 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Cavoukian:2012:PFC,
  author =       "Ann Cavoukian and Alan Davidson and Ed Felton and
                 Marit Hansen and Susan Landau and Anna Slomovic",
  title =        "Privacy: Front and Center",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "5",
  pages =        "10--15",
  month =        sep # "\slash " # oct,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.123",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Oct 22 07:45:36 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Shamos:2012:RVS,
  author =       "Michael Shamos and Alec Yasinsac",
  title =        "Realities of {E}-voting Security",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "5",
  pages =        "16--17",
  month =        sep # "\slash " # oct,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.124",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Oct 22 07:45:36 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Essex:2012:HTE,
  author =       "Aleksander Essex and Urs Hengartner",
  title =        "{Hover}: Trustworthy Elections with Hash-Only
                 Verification",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "5",
  pages =        "18--24",
  month =        sep # "\slash " # oct,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.63",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Oct 22 07:45:36 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Buckland:2012:FVA,
  author =       "Richard Buckland and Roland Wen",
  title =        "The Future of {E}-voting in {Australia}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "5",
  pages =        "25--32",
  month =        sep # "\slash " # oct,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.59",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Oct 22 07:45:36 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Stark:2012:EBE,
  author =       "Philip B. Stark and David Wagner",
  title =        "Evidence-Based Elections",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "5",
  pages =        "33--41",
  month =        sep # "\slash " # oct,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.62",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Oct 22 07:45:36 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Lindeman:2012:GIR,
  author =       "Mark Lindeman and Philip B. Stark",
  title =        "A Gentle Introduction to Risk-Limiting Audits",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "5",
  pages =        "42--49",
  month =        sep # "\slash " # oct,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.56",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Oct 22 07:45:36 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{King:2012:EVS,
  author =       "Merle S. King and Brian Hancock",
  title =        "Electronic Voting Security 10 Years after the {Help
                 America Vote Act}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "5",
  pages =        "50--52",
  month =        sep # "\slash " # oct,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.116",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Oct 22 07:45:36 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Raykova:2012:USP,
  author =       "Mariana Raykova and Ang Cui and Binh Vo and Bin Liu
                 and Tal Malkin and Steven M. Bellovin and Salvatore J.
                 Stolfo",
  title =        "Usable, Secure, Private Search",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "5",
  pages =        "53--60",
  month =        sep # "\slash " # oct,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.155",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Oct 22 07:45:36 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Venkatasubramanian:2012:SIM,
  author =       "Krishna K. Venkatasubramanian and Eugene Y. Vasserman
                 and Oleg Sokolsky and Insup Lee",
  title =        "Security and Interoperable-Medical-Device Systems,
                 Part 1",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "5",
  pages =        "61--63",
  month =        sep # "\slash " # oct,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.128",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Oct 22 07:45:36 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Bishop:2012:SE,
  author =       "Matt Bishop and Sean Peisert",
  title =        "Security and Elections",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "5",
  pages =        "64--67",
  month =        sep # "\slash " # oct,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.127",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Oct 22 07:45:36 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Viega:2012:SED,
  author =       "John Viega and Hugh Thompson",
  title =        "The State of Embedded-Device Security (Spoiler Alert:
                 It's Bad)",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "5",
  pages =        "68--70",
  month =        sep # "\slash " # oct,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.134",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Oct 22 07:45:36 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Pauli:2012:FYC,
  author =       "Josh Pauli and Patrick Engebretson",
  title =        "Filling Your Cyber Operations Training Toolbox",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "5",
  pages =        "71--74",
  month =        sep # "\slash " # oct,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.117",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Oct 22 07:45:36 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Smith:2012:SCB,
  author =       "Sean W. Smith",
  title =        "Security and Cognitive Bias: Exploring the Role of the
                 Mind",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "5",
  pages =        "75--78",
  month =        sep # "\slash " # oct,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.126",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Oct 22 07:45:36 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Lesk:2012:PP,
  author =       "Michael Lesk",
  title =        "The Price of Privacy",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "5",
  pages =        "79--81",
  month =        sep # "\slash " # oct,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.133",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Oct 22 07:45:36 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Obrenovic:2012:IUC,
  author =       "{\v{Z}}eljko Obrenovic and Bart den Haak",
  title =        "Integrating User Customization and Authentication: The
                 Identity Crisis",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "5",
  pages =        "82--85",
  month =        sep # "\slash " # oct,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.119",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Oct 22 07:45:36 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Geer:2012:RA,
  author =       "Daniel E. {Geer, Jr.}",
  title =        "Risk Aversion",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "5",
  pages =        "86--87",
  month =        sep # "\slash " # oct,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.125",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Oct 22 07:45:36 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Schneier:2012:ISE,
  author =       "Bruce Schneier",
  title =        "The Importance of Security Engineering",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "5",
  pages =        "88",
  month =        sep # "\slash " # oct,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.132",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Oct 22 07:45:36 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Viega:2012:GB,
  author =       "John Viega",
  title =        "Giving Back",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "6",
  pages =        "3--4",
  month =        nov # "\slash " # dec,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.146",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Dec 10 18:29:51 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Garber:2012:SPPf,
  author =       "Lee Garber",
  title =        "Security, Privacy, Policy, and Dependability Roundup",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "6",
  pages =        "6--8",
  month =        nov # "\slash " # dec,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.154",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Dec 10 18:29:51 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{McGraw:2012:ISBf,
  author =       "Gary McGraw",
  title =        "Interview: {Silver Bullet} Talks with {Howard
                 Schmidt}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "6",
  pages =        "9--12",
  month =        nov # "\slash " # dec,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.155",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Dec 10 18:29:51 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Viega:2012:TYH,
  author =       "John Viega",
  title =        "Ten Years On, How Are We Doing? (Spoiler Alert: We
                 Have No Clue)",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "6",
  pages =        "13--16",
  month =        nov # "\slash " # dec,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.157",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Dec 10 18:29:51 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Thomsen:2012:LT,
  author =       "Dan Thomsen and Jeremy Epstein and Peter G. Neumann",
  title =        "Lost Treasures",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "6",
  pages =        "17--19",
  month =        nov # "\slash " # dec,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.148",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Dec 10 18:29:51 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Smith:2012:CLS,
  author =       "Richard E. Smith",
  title =        "A Contemporary Look at {Saltzer} and {Schroeder}'s
                 1975 {{\booktitle{Design Principles}}}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "6",
  pages =        "20--25",
  month =        nov # "\slash " # dec,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.85",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Dec 10 18:29:51 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Lipner:2012:LVS,
  author =       "Steve Lipner and Trent Jaeger and Mary Ellen Zurko",
  title =        "Lessons from {VAX\slash SVS} for High-Assurance {VM}
                 Systems",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "6",
  pages =        "26--35",
  month =        nov # "\slash " # dec,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.87",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Dec 10 18:29:51 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib;
                 https://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "secure virtual system (SVS); virtual machine (VM)",
}

@Article{Shrobe:2012:SWG,
  author =       "Howard Shrobe and Daniel Adams",
  title =        "Suppose We Got a Do-Over: a Revolution for Secure
                 Computing",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "6",
  pages =        "36--39",
  month =        nov # "\slash " # dec,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.84",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Dec 10 18:29:51 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Murdoch:2012:HCS,
  author =       "Steven J. Murdoch and Mike Bond and Ross Anderson",
  title =        "How Certification Systems Fail: Lessons from the {Ware
                 Report}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "6",
  pages =        "40--44",
  month =        nov # "\slash " # dec,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.89",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Dec 10 18:29:51 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{McDonald:2012:IHS,
  author =       "Jeffrey T. McDonald and Todd R. Andel",
  title =        "Integrating Historical Security Jewels in Information
                 Assurance Education",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "6",
  pages =        "45--50",
  month =        nov # "\slash " # dec,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.86",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Dec 10 18:29:51 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Alonso-Fernandez:2012:QMB,
  author =       "Fernando Alonso-Fernandez and Julian Fierrez and
                 Javier Ortega-Garcia",
  title =        "Quality Measures in Biometric Systems",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "6",
  pages =        "52--62",
  month =        nov # "\slash " # dec,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2011.178",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Dec 10 18:29:51 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Florencio:2012:EWK,
  author =       "Dinei Florencio and Cormac Herley",
  title =        "Is Everything We Know about Password Stealing Wrong?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "6",
  pages =        "63--69",
  month =        nov # "\slash " # dec,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.57",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Dec 10 18:29:51 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Vasserman:2012:SIM,
  author =       "Eugene Y. Vasserman and Krishna K. Venkatasubramanian
                 and Oleg Sokolsky and Insup Lee",
  title =        "Security and Interoperable-Medical-Device Systems,
                 {Part 2}: Failures, Consequences, and Classification",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "6",
  pages =        "70--73",
  month =        nov # "\slash " # dec,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.153",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Dec 10 18:29:51 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Older:2012:EAU,
  author =       "Susan Older and Shiu-Kai Chin",
  title =        "Engineering Assurance at the Undergraduate Level",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "6",
  pages =        "74--77",
  month =        nov # "\slash " # dec,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.143",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Dec 10 18:29:51 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Brennan:2012:AIF,
  author =       "Michael Brennan",
  title =        "Academic Impact at the {Federal Trade Commission}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "6",
  pages =        "78--82",
  month =        nov # "\slash " # dec,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.139",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Dec 10 18:29:51 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Prandini:2012:ROP,
  author =       "Marco Prandini and Marco Ramilli",
  title =        "Return-Oriented Programming",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "6",
  pages =        "84--87",
  month =        nov # "\slash " # dec,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.152",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Dec 10 18:29:51 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Wash:2012:FS,
  author =       "Rick Wash",
  title =        "Folk Security",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "6",
  pages =        "88--90",
  month =        nov # "\slash " # dec,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.144",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Dec 10 18:29:51 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Kebbel-Wyen:2012:TAS,
  author =       "Josh Kebbel-Wyen",
  title =        "Training an Army of Security Ninjas",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "6",
  pages =        "91--93",
  month =        nov # "\slash " # dec,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.159",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Dec 10 18:29:51 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Geer:2012:PI,
  author =       "Daniel E. {Geer, Jr.} and Daniel B. Larremore",
  title =        "Progress Is Infectious",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "6",
  pages =        "94--95",
  month =        nov # "\slash " # dec,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.151",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Dec 10 18:29:51 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Bellovin:2012:MCI,
  author =       "Steven M. Bellovin",
  title =        "The {Major Cyberincident Investigations Board}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "10",
  number =       "6",
  pages =        "96",
  month =        nov # "\slash " # dec,
  year =         "2012",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.158",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Dec 10 18:29:51 2012",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Pfleeger:2013:ESS,
  author =       "Shari Lawrence Pfleeger",
  title =        "Enlightened Security: Shedding Light on What Works and
                 Why",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "1",
  pages =        "3--4",
  month =        jan # "\slash " # feb,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.7",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Mar 18 08:56:47 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Garber:2013:SPPa,
  author =       "Lee Garber",
  title =        "Security, Privacy, Policy, and Dependability Roundup",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "1",
  pages =        "6--7",
  month =        jan # "\slash " # feb,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.16",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Mar 18 08:56:47 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{McGraw:2013:ISBa,
  author =       "Gary McGraw",
  title =        "Interview: {Silver Bullet} Talks with {Per-Olof
                 Persson}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "1",
  pages =        "8--10",
  month =        jan # "\slash " # feb,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.17",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Mar 18 08:56:47 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Amoroso:2013:VCS,
  author =       "Edward G. Amoroso and Hugh Thompson",
  title =        "A View from the {C-Suite}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "1",
  pages =        "11--12",
  month =        jan # "\slash " # feb,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.4",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Mar 18 08:56:47 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Martin:2013:IEC,
  author =       "Dave Martin",
  title =        "Implementing Effective Controls in a Mobile, Agile,
                 Cloud-Enabled Enterprise",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "1",
  pages =        "13--14",
  month =        jan # "\slash " # feb,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.1",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Mar 18 08:56:47 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Grosse:2013:AS,
  author =       "Eric Grosse and Mayank Upadhyay",
  title =        "Authentication at Scale",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "1",
  pages =        "15--22",
  month =        jan # "\slash " # feb,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.162",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Mar 18 08:56:47 2013",
  bibsource =    "https://www.math.utah.edu/pub/bibnet/authors/g/grosse-eric.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/cms/Computer.org/ComputingNow/pdfs/AuthenticationAtScale.pdf",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "authentication; delegation; Google 2sv; OAutho;
                 passwords; phishing attacks; second factor",
  xxURL =        "http://origin-www.computer.org/csdl/mags/sp/preprint/msp2012990123.pdf",
}

@Article{Amoroso:2013:EPM,
  author =       "Edward G. Amoroso",
  title =        "From the Enterprise Perimeter to a Mobility-Enabled
                 Secure Cloud",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "1",
  pages =        "23--31",
  month =        jan # "\slash " # feb,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.8",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Mar 18 08:56:47 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Thompson:2013:HEI,
  author =       "Hugh Thompson",
  title =        "The Human Element of Information Security",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "1",
  pages =        "32--35",
  month =        jan # "\slash " # feb,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.161",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Mar 18 08:56:47 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Kufel:2013:SEM,
  author =       "Lukasz Kufel",
  title =        "Security Event Monitoring in a Distributed Systems
                 Environment",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "1",
  pages =        "36--43",
  month =        jan # "\slash " # feb,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.61",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Mar 18 08:56:47 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Salah:2013:UCC,
  author =       "Khaled Salah and Jose M. Alcaraz Calero and Sherali
                 Zeadally and Sameera Al-Mulla and Mohammed Alzaabi",
  title =        "Using Cloud Computing to Implement a Security Overlay
                 Network",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "1",
  pages =        "44--53",
  month =        jan # "\slash " # feb,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.88",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Mar 18 08:56:47 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Sood:2013:TCS,
  author =       "Aditya K. Sood and Richard J. Enbody",
  title =        "Targeted Cyberattacks: A Superset of Advanced
                 Persistent Threats",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "1",
  pages =        "54--61",
  month =        jan # "\slash " # feb,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.90",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Mar 18 08:56:47 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Bellovin:2013:GBW,
  author =       "Steven M. Bellovin and Matt Blaze and Sandy Clark and
                 Susan Landau",
  title =        "Going Bright: Wiretapping without Weakening
                 Communications Infrastructure",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "1",
  pages =        "62--72",
  month =        jan # "\slash " # feb,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.138",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Mar 18 08:56:47 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Yasinsac:2013:HTT,
  author =       "Alec Yasinsac and Cynthia Irvine",
  title =        "Help! {Is} There a Trustworthy-Systems Doctor in the
                 House?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "1",
  pages =        "73--77",
  month =        jan # "\slash " # feb,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.10",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Mar 18 08:56:47 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Li:2013:MSL,
  author =       "Qing Li and Greg Clark",
  title =        "Mobile Security: A Look Ahead",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "1",
  pages =        "78--81",
  month =        jan # "\slash " # feb,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.15",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Mar 18 08:56:47 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Borgesius:2013:BTE,
  author =       "Frederik Zuiderveen Borgesius",
  title =        "Behavioral Targeting: A {European} Legal Perspective",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "1",
  pages =        "82--85",
  month =        jan # "\slash " # feb,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.5",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Mar 18 08:56:47 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Green:2013:TC,
  author =       "Matthew Green",
  title =        "The Threat in the Cloud",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "1",
  pages =        "86--89",
  month =        jan # "\slash " # feb,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.20",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Mar 18 08:56:47 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Kott:2013:PCC,
  author =       "Alexander Kott and Curtis Arnold",
  title =        "The Promises and Challenges of Continuous Monitoring
                 and Risk Scoring",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "1",
  pages =        "90--93",
  month =        jan # "\slash " # feb,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.19",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Mar 18 08:56:47 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Geer:2013:TTC,
  author =       "Daniel E. {Geer, Jr.} and Daniel G. Conway",
  title =        "The Times, They Are a Changin'",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "1",
  pages =        "94--95",
  month =        jan # "\slash " # feb,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.21",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Mar 18 08:56:47 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Geer:2013:LWI,
  author =       "Daniel E. {Geer, Jr.}",
  title =        "Last Word: Identity as Privacy",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "1",
  pages =        "96",
  month =        jan # "\slash " # feb,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.11",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Mar 18 08:56:47 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Schneider:2013:BR,
  author =       "Fred B. Schneider",
  title =        "Breaking-in Research",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "2",
  pages =        "3--4",
  month =        mar # "\slash " # apr,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.28",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 1 09:11:38 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Garber:2013:SPPb,
  author =       "Lee Garber",
  title =        "Security, Privacy, Policy, and Dependability Roundup",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "2",
  pages =        "6--7",
  month =        mar # "\slash " # apr,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.40",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 1 09:11:38 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{McGraw:2013:ISBb,
  author =       "Gary McGraw",
  title =        "Interview: {Silver Bullet} Talks with {Steve
                 Bellovin}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "2",
  pages =        "8--11",
  month =        mar # "\slash " # apr,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.41",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 1 09:11:38 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Benzel:2013:CGDa,
  author =       "Terry V. Benzel and Steve Lipner",
  title =        "Crossing the Great Divide: Transferring Security
                 Technology from Research to the Market",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "2",
  pages =        "12--13",
  month =        mar # "\slash " # apr,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.33",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 1 09:11:38 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Maughan:2013:CVD,
  author =       "Douglas Maughan and David Balenson and Ulf Lindqvist
                 and Zachary Tudor",
  title =        "Crossing the {``Valley} of Death'': Transitioning
                 Cybersecurity Research into Practice",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "2",
  pages =        "14--23",
  month =        mar # "\slash " # apr,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.31",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 1 09:11:38 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{DAmico:2013:BBA,
  author =       "Anita D'Amico and Brianne O'Brien and Mark Larkin",
  title =        "Building a Bridge across the Transition Chasm",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "2",
  pages =        "24--33",
  month =        mar # "\slash " # apr,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.160",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 1 09:11:38 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Jensen:2013:FIM,
  author =       "Jostein Jensen and Martin Gilje Jaatun",
  title =        "{Federated Identity Management} --- We Built It; Why
                 Won't They Come?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "2",
  pages =        "34--41",
  month =        mar # "\slash " # apr,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.135",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 1 09:11:38 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Benzel:2013:CGDb,
  author =       "Terry V. Benzel and Eric O'Brien and Robert Rodriguez
                 and William Arbaugh and John Sebes",
  title =        "Crossing the {Great Divide}: From Research to Market",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "2",
  pages =        "42--46",
  month =        mar # "\slash " # apr,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.32",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 1 09:11:38 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Coppens:2013:PYS,
  author =       "Bart Coppens and Bjorn {De Sutter} and Koen {De
                 Bosschere}",
  title =        "Protecting Your Software Updates",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "2",
  pages =        "47--54",
  month =        mar # "\slash " # apr,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.113",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 1 09:11:38 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Bikos:2013:LSS,
  author =       "Anastasios N. Bikos and Nicolas Sklavos",
  title =        "{LTE\slash SAE} Security Issues on {$4$G} Wireless
                 Networks",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "2",
  pages =        "55--62",
  month =        mar # "\slash " # apr,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.136",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 1 09:11:38 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Trope:2013:EOD,
  author =       "Roland L. Trope and Stephen J. Humes",
  title =        "By Executive Order: Delivery of Cyber Intelligence
                 Imparts Cyber Responsibilities",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "2",
  pages =        "63--67",
  month =        mar # "\slash " # apr,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.29",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 1 09:11:38 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Gorbenko:2013:TOI,
  author =       "Anatoliy Gorbenko and Alexander Romanovsky",
  title =        "Time-Outing {Internet} Services",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "2",
  pages =        "68--71",
  month =        mar # "\slash " # apr,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.43",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 1 09:11:38 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Koss:2013:ACM,
  author =       "Ian Koss and Richard Ford",
  title =        "Authorship Is Continuous: Managing Code Plagiarism",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "2",
  pages =        "72--74",
  month =        mar # "\slash " # apr,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.26",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 1 09:11:38 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Narayanan:2013:WHCa,
  author =       "Arvind Narayanan",
  title =        "What Happened to the Crypto Dream?, {Part 1}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "2",
  pages =        "75--76",
  month =        mar # "\slash " # apr,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.45",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 1 09:11:38 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Cranor:2013:SPE,
  author =       "Lorrie Faith Cranor and Norman Sadeh",
  title =        "A Shortage of Privacy Engineers",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "2",
  pages =        "77--79",
  month =        mar # "\slash " # apr,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.25",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 1 09:11:38 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Hayes:2013:NSA,
  author =       "Adrian Hayes",
  title =        "Network Service Authentication Timing Attacks",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "2",
  pages =        "80--82",
  month =        mar # "\slash " # apr,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.39",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 1 09:11:38 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Bratus:2013:AWU,
  author =       "Sergey Bratus and Anna Shubina",
  title =        "Avoiding a War on Unauthorized Computation",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "2",
  pages =        "83--88",
  month =        mar # "\slash " # apr,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.27",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 1 09:11:38 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Herley:2013:WDT,
  author =       "Cormac Herley",
  title =        "When Does Targeting Make Sense for an Attacker?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "2",
  pages =        "89--92",
  month =        mar # "\slash " # apr,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.46",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 1 09:11:38 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Acquisti:2013:CPP,
  author =       "Alessandro Acquisti",
  title =        "Complementary Perspectives on Privacy and Security:
                 Economics",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "2",
  pages =        "93--95",
  month =        mar # "\slash " # apr,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.30",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 1 09:11:38 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Schneier:2013:IO,
  author =       "Bruce Schneier",
  title =        "{IT} for Oppression",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "2",
  pages =        "96",
  month =        mar # "\slash " # apr,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.36",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 1 09:11:38 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Epstein:2013:EAT,
  author =       "Jeremy Epstein",
  title =        "From the {Editors}: Are all types of {Internet} voting
                 unsafe?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "3",
  pages =        "3--4",
  month =        may # "\slash " # jun,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.57",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Jun 21 09:16:58 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Garber:2013:SPPc,
  author =       "Lee Garber",
  title =        "Security, privacy, policy, and dependability roundup",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "3",
  pages =        "6--7",
  month =        may # "\slash " # jun,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.70",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Jun 21 09:16:58 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{McGraw:2013:ISBc,
  author =       "Gary McGraw",
  title =        "Interview: {Silver Bullet} talks with {Thomas Rid}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "3",
  pages =        "8--10",
  month =        may # "\slash " # jun,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.71",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Jun 21 09:16:58 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Landau:2013:GEI,
  author =       "Susan Landau",
  title =        "{Guest Editor}'s Introduction: Politics, love, and
                 death in a world of no privacy",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "3",
  pages =        "11--13",
  month =        may # "\slash " # jun,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.65",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Jun 21 09:16:58 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Krishnamurthy:2013:POS,
  author =       "Balachander Krishnamurthy",
  title =        "Privacy and online social networks: can colorless
                 green ideas sleep furiously?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "3",
  pages =        "14--20",
  month =        may # "\slash " # jun,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.66",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Jun 21 09:16:58 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{deAndrade:2013:ABS,
  author =       "Norberto Nuno Gomes de Andrade and Aaron Martin and
                 Shara Monteleone",
  title =        "``{All} the better to see you with, my dear'': Facial
                 recognition and privacy in online social networks",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "3",
  pages =        "21--28",
  month =        may # "\slash " # jun,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.22",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Jun 21 09:16:58 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Gurses:2013:TTP,
  author =       "Seda Gurses and Claudia Diaz",
  title =        "Two tales of privacy in online social networks",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "3",
  pages =        "29--37",
  month =        may # "\slash " # jun,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.47",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Jun 21 09:16:58 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Hargittai:2013:NSE,
  author =       "Eszter Hargittai and Eden Litt",
  title =        "New strategies for employment? {Internet} skills and
                 online privacy practices during people's job search",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "3",
  pages =        "38--45",
  month =        may # "\slash " # jun,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.64",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Jun 21 09:16:58 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Singh:2013:TTP,
  author =       "Indrajeet Singh and Michael Butkiewicz and Harsha V.
                 Madhyastha and Srikanth V. Krishnamurthy and Sateesh
                 Addepalli",
  title =        "{Twitsper}: Tweeting privately",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "3",
  pages =        "46--50",
  month =        may # "\slash " # jun,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.3",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Jun 21 09:16:58 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anderson:2013:MSN,
  author =       "Jonathan Anderson and Frank Stajano",
  title =        "Must social networking conflict with privacy?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "3",
  pages =        "51--60",
  month =        may # "\slash " # jun,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.23",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Jun 21 09:16:58 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Koopman:2013:IEC,
  author =       "Philip Koopman and Christopher Szilagyi",
  title =        "Integrity in embedded control networks",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "3",
  pages =        "61--63",
  month =        may # "\slash " # jun,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.61",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Jun 21 09:16:58 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Gondree:2013:STP,
  author =       "Mark Gondree and Zachary N. J. Peterson and Tamara
                 Denning",
  title =        "Security through play",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "3",
  pages =        "64--67",
  month =        may # "\slash " # jun,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.69",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Jun 21 09:16:58 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Narayanan:2013:WHCb,
  author =       "Arvind Narayanan",
  title =        "What Happened to the Crypto Dream?, {Part 2}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "3",
  pages =        "68--71",
  month =        may # "\slash " # jun,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.75",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Jun 21 09:16:58 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Breaux:2013:WES,
  author =       "Travis Breaux and David Gordon",
  title =        "What engineers should know about {US} security and
                 privacy law",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "3",
  pages =        "72--76",
  month =        may # "\slash " # jun,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.74",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Jun 21 09:16:58 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Koppel:2013:CCA,
  author =       "Benedikt Koppel and Stephan Neuhaus",
  title =        "{Crypto Corner}: Analysis of a hardware security
                 module's high-availability setting",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "3",
  pages =        "77--80",
  month =        may # "\slash " # jun,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.56",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Jun 21 09:16:58 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Lesk:2013:SPEa,
  author =       "Michael Lesk",
  title =        "Security \& Privacy Economics: Privateers in
                 cyberspace: Aargh!",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "3",
  pages =        "81--84",
  month =        may # "\slash " # jun,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.67",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Jun 21 09:16:58 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Pfleeger:2013:OOR,
  author =       "Shari Lawrence Pfleeger",
  title =        "In Our Orbit: {Ramsey} theory: Learning about the
                 needle in the haystack",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "3",
  pages =        "85--87",
  month =        may # "\slash " # jun,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.68",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Jun 21 09:16:58 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Bellovin:2013:LWM,
  author =       "Steven M. Bellovin",
  title =        "Last Word: Military cybersomethings",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "3",
  pages =        "88",
  month =        may # "\slash " # jun,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.63",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Jun 21 09:16:58 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Schneider:2013:CEU,
  author =       "Fred B. Schneider",
  title =        "Cybersecurity Education in Universities",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "4",
  pages =        "3--4",
  month =        jul # "\slash " # aug,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.84",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Aug 12 11:34:33 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Garber:2013:SPPd,
  author =       "Lee Garber",
  title =        "Security, Privacy, Policy, and Dependability Roundup",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "4",
  pages =        "6--7",
  month =        jul # "\slash " # aug,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.97",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Aug 12 11:34:33 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{McGraw:2013:ISBd,
  author =       "Gary McGraw",
  title =        "Interview: {Silver Bullet} Talks with {Gary Warzala}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "4",
  pages =        "8--10",
  month =        jul # "\slash " # aug,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.98",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Aug 12 11:34:33 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Bloomfield:2013:SCS,
  author =       "Robin Bloomfield and Jay Lala",
  title =        "Safety-Critical Systems: The Next Generation",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "4",
  pages =        "11--13",
  month =        jul # "\slash " # aug,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.95",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Aug 12 11:34:33 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Alemzadeh:2013:ASC,
  author =       "Homa Alemzadeh and Ravishankar K. Iyer and Zbigniew
                 Kalbarczyk and Jai Raman",
  title =        "Analysis of Safety-Critical Computer Failures in
                 Medical Devices",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "4",
  pages =        "14--26",
  month =        jul # "\slash " # aug,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.49",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Aug 12 11:34:33 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Mitra:2013:VCP,
  author =       "Sayan Mitra and Tichakorn Wongpiromsarn and Richard M.
                 Murray",
  title =        "Verifying Cyber-Physical Interactions in
                 Safety-Critical Systems",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "4",
  pages =        "28--37",
  month =        jul # "\slash " # aug,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.77",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Aug 12 11:34:33 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Cotroneo:2013:FIS,
  author =       "Domenico Cotroneo and Roberto Natella",
  title =        "Fault Injection for Software Certification",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "4",
  pages =        "38--45",
  month =        jul # "\slash " # aug,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.54",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Aug 12 11:34:33 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Rosa:2013:MXI,
  author =       "Thiago Mattos Rosa and Altair Olivo Santin and Andreia
                 Malucelli",
  title =        "Mitigating {XML} Injection 0-Day Attacks through
                 Strategy-Based Detection Systems",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "4",
  pages =        "46--53",
  month =        jul # "\slash " # aug,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.83",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Aug 12 11:34:33 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Landau:2013:MSS,
  author =       "Susan Landau",
  title =        "Making Sense from {Snowden}: What's Significant in the
                 {NSA} Surveillance Revelations",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "4",
  pages =        "54--63",
  month =        jul # "\slash " # aug,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.90",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Aug 12 11:34:33 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Stein:2013:ENS,
  author =       "Jeff Stein",
  title =        "The End of National Security Reporting?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "4",
  pages =        "64--68",
  month =        jul # "\slash " # aug,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.100",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Aug 12 11:34:33 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Eagle:2013:CSC,
  author =       "Chris Eagle",
  title =        "Computer Security Competitions: Expanding Educational
                 Outcomes",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "4",
  pages =        "69--71",
  month =        jul # "\slash " # aug,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.83",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Aug 12 11:34:33 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Acquisti:2013:GSL,
  author =       "Alessandro Acquisti and Idris Adjerid and Laura
                 Brandimarte",
  title =        "Gone in 15 Seconds: The Limits of Privacy Transparency
                 and Control",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "4",
  pages =        "72--74",
  month =        jul # "\slash " # aug,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.86",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Aug 12 11:34:33 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Mangard:2013:KSL,
  author =       "Stefan Mangard",
  title =        "Keeping Secrets on Low-Cost Chips",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "4",
  pages =        "75--77",
  month =        jul # "\slash " # aug,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.88",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Aug 12 11:34:33 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Bace:2013:PME,
  author =       "Rebecca Bace",
  title =        "Pain Management for Entrepreneurs: Working with
                 Venture Capital",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "4",
  pages =        "78--81",
  month =        jul # "\slash " # aug,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.93",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Aug 12 11:34:33 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{McLaughlin:2013:SCS,
  author =       "Stephen McLaughlin",
  title =        "Securing Control Systems from the Inside: A Case for
                 Mediating Physical Behaviors",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "4",
  pages =        "82--84",
  month =        jul # "\slash " # aug,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.96",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Aug 12 11:34:33 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Lesk:2013:BDB,
  author =       "Michael Lesk",
  title =        "Big Data, {Big Brother}, Big Money",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "4",
  pages =        "85--89",
  month =        jul # "\slash " # aug,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.81",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Aug 12 11:34:33 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Dery:2013:UWC,
  author =       "Susan Dery",
  title =        "Using Whitelisting to Combat Malware Attacks at
                 {Fannie Mae}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "4",
  pages =        "90--92",
  month =        jul # "\slash " # aug,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.102",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Aug 12 11:34:33 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Sagarin:2013:BHT,
  author =       "Rafe Sagarin",
  title =        "Bio-hacking: Tapping Life's Code to Deal with
                 Unpredictable Risk",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "4",
  pages =        "93--95",
  month =        jul # "\slash " # aug,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.82",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Aug 12 11:34:33 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Geer:2013:A,
  author =       "Daniel E. Geer",
  title =        "On Abandonment",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "4",
  pages =        "96",
  month =        jul # "\slash " # aug,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.92",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Aug 12 11:34:33 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Bloomfield:2013:OA,
  author =       "Robin Bloomfield",
  title =        "Open Assurance",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "5",
  pages =        "3--4",
  month =        sep # "\slash " # oct,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.119",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Nov 15 07:50:42 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Garber:2013:NBSa,
  author =       "Lee Garber",
  title =        "News Briefs: Security, Privacy, Policy, and
                 Dependability Roundup",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "5",
  pages =        "6--7",
  month =        sep # "\slash " # oct,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.121",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Nov 15 07:50:42 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{McGraw:2013:ISBe,
  author =       "Gary McGraw",
  title =        "Interview: {Silver Bullet} Talks with {Wenyuan Xu}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "5",
  pages =        "8--10",
  month =        sep # "\slash " # oct,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.122",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Nov 15 07:50:42 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Kirkham:2013:PDS,
  author =       "Tom Kirkham and Sandra Winfield and Serge Ravet and
                 Sampo Kellom{\"a}ki",
  title =        "The Personal Data Store Approach to Personal Data
                 Security",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "5",
  pages =        "12--19",
  month =        sep # "\slash " # oct,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2012.137",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Nov 15 07:50:42 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Harrison:2013:ADC,
  author =       "Keith Harrison and Gregory B. White",
  title =        "Anonymous and Distributed Community Cyberincident
                 Detection",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "5",
  pages =        "20--27",
  month =        sep # "\slash " # oct,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.24",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Nov 15 07:50:42 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Goh:2013:TOT,
  author =       "Weihan Goh and Chai Kiat Yeo",
  title =        "Teaching an Old {TPM} New Tricks: Repurposing for
                 Identity-Based Signatures",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "5",
  pages =        "28--35",
  month =        sep # "\slash " # oct,
  year =         "2013",
  CODEN =        "????",
  DOI =          "",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Nov 15 07:50:42 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Birrell:2013:FIM,
  author =       "Eleanor Birrell and Fred B. Schneider",
  title =        "Federated Identity Management Systems: A Privacy-Based
                 Characterization",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "5",
  pages =        "36--48",
  month =        sep # "\slash " # oct,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.114",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Nov 15 07:50:42 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Qiu:2013:IDR,
  author =       "Wei-dong Qiu and Qian Su and Bo-zhong Liu",
  title =        "{iOS} Data Recovery Using Low-Level {NAND} Images",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "5",
  pages =        "49--55",
  month =        sep # "\slash " # oct,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.50",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Nov 15 07:50:42 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Marx:2013:PPT,
  author =       "Gary T. Marx",
  title =        "The Public as Partner? {Technology} Can Make Us
                 Auxiliaries as Well as Vigilantes",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "5",
  pages =        "56--61",
  month =        sep # "\slash " # oct,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.126",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Nov 15 07:50:42 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Haverkort:2013:DSS,
  author =       "Boudewijn R. Haverkort",
  title =        "The Dependable Systems-of-Systems Design Challenge",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "5",
  pages =        "62--65",
  month =        sep # "\slash " # oct,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.124",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Nov 15 07:50:42 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Irvine:2013:CP,
  author =       "Cynthia Irvine",
  title =        "A Cyberoperations Program",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "5",
  pages =        "66--69",
  month =        sep # "\slash " # oct,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.108",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Nov 15 07:50:42 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Calo:2013:TSM,
  author =       "Ryan Calo",
  title =        "Tiny Salespeople: Mediated Transactions and the
                 {Internet of Things}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "5",
  pages =        "70--72",
  month =        sep # "\slash " # oct,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.127",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Nov 15 07:50:42 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Matyas:2013:CBI,
  author =       "Vashek Maty{\'a}{\v{s}} and Ji{\v{r}}{\'\i}
                 K{\r{u}}r",
  title =        "Conflicts between Intrusion Detection and Privacy
                 Mechanisms for Wireless Sensor Networks",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "5",
  pages =        "73--76",
  month =        sep # "\slash " # oct,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.111",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Nov 15 07:50:42 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Alves-Foss:2013:KU,
  author =       "Jim Alves-Foss and Paul Oman",
  title =        "The Known Unknowns",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "5",
  pages =        "77--79",
  month =        sep # "\slash " # oct,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.125",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Nov 15 07:50:42 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Blythe:2013:CSG,
  author =       "Jim Blythe and Ross Koppel and Sean W. Smith",
  title =        "Circumvention of Security: Good Users Do Bad Things",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "5",
  pages =        "80--83",
  month =        sep # "\slash " # oct,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.110",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Nov 15 07:50:42 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Ellison:2013:PPH,
  author =       "Nicole B. Ellison and Jeffrey T. Hancock",
  title =        "Profile as Promise: Honest and Deceptive Signals in
                 Online Dating",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "5",
  pages =        "84--88",
  month =        sep # "\slash " # oct,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.120",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Nov 15 07:50:42 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Hilburn:2013:BSR,
  author =       "Thomas B. Hilburn and Nancy R. Mead",
  title =        "Building Security In: A Road to Competency",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "5",
  pages =        "89--92",
  month =        sep # "\slash " # oct,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.109",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Nov 15 07:50:42 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Gradon:2013:CSI,
  author =       "Kacper Gradon",
  title =        "Crime Science and the {Internet} Battlefield: Securing
                 the Analog World from Digital Crime",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "5",
  pages =        "93--95",
  month =        sep # "\slash " # oct,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.112",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Nov 15 07:50:42 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Schneier:2013:LWT,
  author =       "Bruce Schneier",
  title =        "Last word: Trust in Man\slash Machine Security
                 Systems",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "5",
  pages =        "96--96",
  month =        sep # "\slash " # oct,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.128",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Nov 15 07:50:42 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2013:FC,
  author =       "Anonymous",
  title =        "Front Cover",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "6",
  pages =        "c1--c1",
  month =        nov # "\slash " # dec,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.144",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Dec 18 18:41:55 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2013:UHA,
  author =       "Anonymous",
  title =        "{Usenix} [House Advertisement]",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "6",
  pages =        "c2--c2",
  month =        nov # "\slash " # dec,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.156",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Dec 18 18:41:55 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2013:TC,
  author =       "Anonymous",
  title =        "Table of Contents",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "6",
  pages =        "1--2",
  month =        nov # "\slash " # dec,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.153",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Dec 18 18:41:55 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Pfleeger:2013:FP,
  author =       "Shari Lawrence Pfleeger",
  title =        "Focus on Policy",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "6",
  pages =        "3--3",
  month =        nov # "\slash " # dec,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.143",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Dec 18 18:41:55 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2013:M,
  author =       "Anonymous",
  title =        "Masthead",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "6",
  pages =        "4",
  month =        nov # "\slash " # dec,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.147",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Dec 18 18:41:55 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{McGraw:2013:ISBf,
  author =       "Gary McGraw",
  title =        "Interview: {Silver Bullet} Talks with {W. Hord
                 Tipton}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "6",
  pages =        "5--7",
  month =        nov # "\slash " # dec,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.151",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Dec 18 18:41:55 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Garber:2013:NBSb,
  author =       "Lee Garber",
  title =        "News Briefs: Security, Privacy, Policy, and
                 Dependability Roundup",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "6",
  pages =        "8--9",
  month =        nov # "\slash " # dec,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.150",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Dec 18 18:41:55 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Caine:2013:SPH,
  author =       "Kelly Caine and Michael Lesk",
  title =        "Security and Privacy in Health {IT} [{Guest} editors'
                 introduction]",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "6",
  pages =        "10--11",
  month =        nov # "\slash " # dec,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.149",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Dec 18 18:41:55 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Chignell:2013:NPT,
  author =       "Mark Chignell and Mahsa Rouzbahman and Ryan Kealey and
                 Reza Samavi and Erin Yu and Tammy Sieminowski",
  title =        "Nonconfidential Patient Types in Emergency Clinical
                 Decision Support",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "6",
  pages =        "12--18",
  month =        nov # "\slash " # dec,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.103",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Dec 18 18:41:55 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Lesk:2013:EMR,
  author =       "Michael Lesk",
  title =        "Electronic Medical Records: Confidentiality, Care, and
                 Epidemiology",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "6",
  pages =        "19--24",
  month =        nov # "\slash " # dec,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.78",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Dec 18 18:41:55 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anthony:2013:SIT,
  author =       "Denise Anthony and Andrew T. Campbell and Thomas
                 Candon and Andrew Gettinger and David Kotz and Lisa A.
                 Marsch and Andres Molina-Markham and Karen Page and
                 Sean W. Smith and Carl A. Gunter and M. Eric Johnson",
  title =        "Securing Information Technology in Healthcare",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "6",
  pages =        "25--33",
  month =        nov # "\slash " # dec,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.104",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Dec 18 18:41:55 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Tormo:2013:IMP,
  author =       "Gines Dolera Tormo and Felix Gomez Marmol and Joao
                 Girao and Gregorio Martinez Perez",
  title =        "Identity Management --- In Privacy We Trust: Bridging
                 the Trust Gap in {eHealth} Environments",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "6",
  pages =        "34--41",
  month =        nov # "\slash " # dec,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.80",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Dec 18 18:41:55 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Peel:2013:PCC,
  author =       "Deborah C. Peel",
  title =        "Point\slash Counterpoint: The Consequences of the Lack
                 of Privacy in Today's Electronic Health Systems",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "6",
  pages =        "42--44",
  month =        nov # "\slash " # dec,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.148",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Dec 18 18:41:55 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{McGraw:2013:PCP,
  author =       "Deven McGraw",
  title =        "Point\slash Counterpoint: Privacy and Security as
                 Enable, Not Barrier, to Responsible Health Data Uses",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "6",
  pages =        "42--44",
  month =        nov # "\slash " # dec,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.148",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Dec 18 18:41:55 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Ahmed:2013:RTD,
  author =       "Abdulghani Ali Ahmed and Aman Jantan and Tat-Chee
                 Wan",
  title =        "Real-Time Detection of Intrusive Traffic in {QoS}
                 Network Domains",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "6",
  pages =        "45--53",
  month =        nov # "\slash " # dec,
  year =         "2013",
  CODEN =        "????",
  DOI =          "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Dec 18 18:41:55 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Kaur:2013:AAS,
  author =       "Sanmeet Kaur and Maninder Singh",
  title =        "Automatic Attack Signature Generation Systems: A
                 Review",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "6",
  pages =        "54--61",
  month =        nov # "\slash " # dec,
  year =         "2013",
  CODEN =        "????",
  DOI =          "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Dec 18 18:41:55 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Verissimo:2013:BWY,
  author =       "Paulo Esteves Verissimo and Alysson Bessani",
  title =        "E-biobanking: What Have You Done to My Cell Samples?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "6",
  pages =        "62--65",
  month =        nov # "\slash " # dec,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.141",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Dec 18 18:41:55 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{McGettrick:2013:TEC,
  author =       "Andrew McGettrick",
  title =        "Toward Effective Cybersecurity Education",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "6",
  pages =        "66--68",
  month =        nov # "\slash " # dec,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.155",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Dec 18 18:41:55 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Dewey-Hagborg:2013:SVP,
  author =       "Heather Dewey-Hagborg",
  title =        "Stranger Visions: A Provocation",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "6",
  pages =        "69--70",
  month =        nov # "\slash " # dec,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.152",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Dec 18 18:41:55 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Cioranesco:2013:CCC,
  author =       "Jean-Michel Cioranesco and Houda Ferradi and David
                 Naccache",
  title =        "Crypto Corner: Communicating Covertly through {CPU}
                 Monitoring",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "6",
  pages =        "71--73",
  month =        nov # "\slash " # dec,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.140",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Dec 18 18:41:55 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Cardenas:2013:SSB,
  author =       "Alvaro A. Cardenas and Pratyusa K. Manadhata and
                 Sreeranga P. Rajan",
  title =        "Systems Security: Big Data Analytics for Security",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "6",
  pages =        "74--76",
  month =        nov # "\slash " # dec,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.138",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Dec 18 18:41:55 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Lesk:2013:SPEb,
  author =       "Michael Lesk",
  title =        "Security \& Privacy Economics: The Old Is New Again",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "6",
  pages =        "77--79",
  month =        nov # "\slash " # dec,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.154",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Dec 18 18:41:55 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Mead:2013:BSP,
  author =       "Nancy R. Mead and Thomas B. Hilburn",
  title =        "Building Security In: Preparing for a Software
                 Security Career",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "6",
  pages =        "80--83",
  month =        nov # "\slash " # dec,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.139",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Dec 18 18:41:55 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Molotch:2013:ESD,
  author =       "Harvey Molotch",
  title =        "Everyday Security: Default to Decency",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "6",
  pages =        "84--87",
  month =        nov # "\slash " # dec,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.142",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Dec 18 18:41:55 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Bellovin:2013:LWW,
  author =       "Steven M. Bellovin",
  title =        "The Last Word: Walls and Gates",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "6",
  pages =        "88--88",
  month =        nov # "\slash " # dec,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.157",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Dec 18 18:41:55 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2013:IWC,
  author =       "Anonymous",
  title =        "{InfoSec World Conference 2014} Trade Advertisement",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "6",
  pages =        "c3--c3",
  month =        nov # "\slash " # dec,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.145",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Dec 18 18:41:55 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2013:MSH,
  author =       "Anonymous",
  title =        "Magazine Subscribe [House Advertisement]",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "11",
  number =       "6",
  pages =        "c4--c4",
  month =        nov # "\slash " # dec,
  year =         "2013",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.146",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Dec 18 18:41:55 2013",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2014:FCa,
  author =       "Anonymous",
  title =        "Front Cover",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "1",
  pages =        "c1",
  month =        jan # "\slash " # feb,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2014.3",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Apr 1 10:48:05 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2014:RSMa,
  author =       "Anonymous",
  title =        "Rock Stars of Mobile Cloud [House Advertisement]",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "1",
  pages =        "c2",
  month =        jan # "\slash " # feb,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2014.12",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Apr 1 10:48:05 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2014:TCa,
  author =       "Anonymous",
  title =        "Table of Contents",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "1",
  pages =        "1--2",
  month =        jan # "\slash " # feb,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2014.17",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Apr 1 10:48:05 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Horne:2014:HL,
  author =       "Bill Horne",
  title =        "Humans in the Loop",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "1",
  pages =        "3--4",
  month =        jan # "\slash " # feb,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2014.5",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Apr 1 10:48:05 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2014:Ma,
  author =       "Anonymous",
  title =        "Masthead",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "1",
  pages =        "5",
  month =        jan # "\slash " # feb,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2014.7",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Apr 1 10:48:05 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{McGraw:2014:SBTa,
  author =       "Gary McGraw",
  title =        "{Silver Bullet} Talks with {Jon Callas}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "1",
  pages =        "6--8",
  month =        jan # "\slash " # feb,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2014.15",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Apr 1 10:48:05 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Garber:2014:SPPa,
  author =       "Lee Garber",
  title =        "Security, Privacy, Policy, and Dependability Roundup",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "1",
  pages =        "9--10",
  month =        jan # "\slash " # feb,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2014.13",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Apr 1 10:48:05 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Sasse:2014:PY,
  author =       "M. Angela Sasse and Charles C. Palmer",
  title =        "Protecting You",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "1",
  pages =        "11--13",
  month =        jan # "\slash " # feb,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2014.11",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Apr 1 10:48:05 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Herley:2014:MA,
  author =       "Cormac Herley",
  title =        "More Is Not the Answer",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "1",
  pages =        "14--19",
  month =        jan # "\slash " # feb,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.134",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Apr 1 10:48:05 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Garfinkel:2014:LSI,
  author =       "Simson L. Garfinkel",
  title =        "Leaking Sensitive Information in Complex Document
                 Files--and How to Prevent It",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "1",
  pages =        "20--27",
  month =        jan # "\slash " # feb,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.131",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Apr 1 10:48:05 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Caputo:2014:GSP,
  author =       "Deanna D. Caputo and Shari Lawrence Pfleeger and Jesse
                 D. Freeman and M. Eric Johnson",
  title =        "Going Spear Phishing: Exploring Embedded Training and
                 Awareness",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "1",
  pages =        "28--38",
  month =        jan # "\slash " # feb,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.106",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Apr 1 10:48:05 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Sasse:2014:HYP,
  author =       "M. Angela Sasse and Charles C. Palmer and Markus
                 Jakobsson and Sunny Consolvo and Rick Wash and L. Jean
                 Camp",
  title =        "Helping You Protect You",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "1",
  pages =        "39--42",
  month =        jan # "\slash " # feb,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2014.4",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Apr 1 10:48:05 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Lin:2014:RSC,
  author =       "Ying-Dar Lin and Chia-Yin Lee and Hao-Chuan Tsai",
  title =        "Redefining Security Criteria for Networking Devices
                 with Case Studies",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "1",
  pages =        "43--53",
  month =        jan # "\slash " # feb,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.76",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Apr 1 10:48:05 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Geva:2014:BDD,
  author =       "Moti Geva and Amir Herzberg and Yehoshua Gev",
  title =        "Bandwidth Distributed Denial of Service: Attacks and
                 Defenses",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "1",
  pages =        "54--61",
  month =        jan # "\slash " # feb,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.55",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Apr 1 10:48:05 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Landau:2014:HMS,
  author =       "Susan Landau",
  title =        "Highlights from Making Sense of {Snowden}, {Part II}:
                 What's Significant in the {NSA} Revelations",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "1",
  pages =        "62--64",
  month =        jan # "\slash " # feb,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.161",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Apr 1 10:48:05 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Candea:2014:TVP,
  author =       "George Candea",
  title =        "The Tests-versus-Proofs Conundrum",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "1",
  pages =        "65--68",
  month =        jan # "\slash " # feb,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2014.18",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Apr 1 10:48:05 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Bhattacharya:2014:LMS,
  author =       "Prabir Bhattacharya and Li Yang and Minzhe Guo and Kai
                 Qian and Ming Yang",
  title =        "Learning Mobile Security with {Labware}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "1",
  pages =        "69--72",
  month =        jan # "\slash " # feb,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2014.6",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Apr 1 10:48:05 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Ohm:2014:SSW,
  author =       "Paul Ohm",
  title =        "Should Sniffing {Wi-Fi} Be Illegal?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "1",
  pages =        "73--76",
  month =        jan # "\slash " # feb,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2014.14",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Apr 1 10:48:05 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Eckhoff:2014:DBD,
  author =       "David Eckhoff and Christoph Sommer",
  title =        "Driving for Big Data? {Privacy} Concerns in Vehicular
                 Networking",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "1",
  pages =        "77--79",
  month =        jan # "\slash " # feb,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2014.2",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Apr 1 10:48:05 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Ford:2014:PM,
  author =       "Richard Ford and Marco Carvalho",
  title =        "Protecting Me",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "1",
  pages =        "80--82",
  month =        jan # "\slash " # feb,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2014.10",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Apr 1 10:48:05 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Bratus:2014:BPB,
  author =       "Sergey Bratus and Trey Darley and Michael Locasto and
                 Meredith L. Patterson and Rebecca ``bx'' Shapiro and
                 Anna Shubina",
  title =        "Beyond Planted Bugs in `Trusting Trust': The
                 Input-Processing Frontier",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "1",
  pages =        "83--87",
  month =        jan # "\slash " # feb,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2014.1",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Apr 1 10:48:05 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Geer:2014:LWP,
  author =       "Daniel E. Geer",
  title =        "Last Word: Polarization",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "1",
  pages =        "88",
  month =        jan # "\slash " # feb,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2014.9",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Apr 1 10:48:05 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2014:SISa,
  author =       "Anonymous",
  title =        "Subscribe to {{\booktitle{IEEE Security \& Privacy}}}
                 [House Advertisement]",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "1",
  pages =        "c3",
  month =        jan # "\slash " # feb,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2014.16",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Apr 1 10:48:05 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2014:FCb,
  author =       "Anonymous",
  title =        "Front Cover",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "2",
  pages =        "c1",
  month =        mar # "\slash " # apr,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2014.23",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 21 17:20:35 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2014:MSH,
  author =       "Anonymous",
  title =        "Magazine Subscribe [House Advertisement]",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "2",
  pages =        "c2",
  month =        mar # "\slash " # apr,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2014.25",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 21 17:20:35 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2014:TCb,
  author =       "Anonymous",
  title =        "Table of Contents",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "2",
  pages =        "1--2",
  month =        mar # "\slash " # apr,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2014.36",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 21 17:20:35 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2014:TAB,
  author =       "Anonymous",
  title =        "Taking Action to Build Trust in Security",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "2",
  pages =        "3--4",
  month =        mar # "\slash " # apr,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2014.37",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 21 17:20:35 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2014:Mb,
  author =       "Anonymous",
  title =        "Masthead",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "2",
  pages =        "5",
  month =        mar # "\slash " # apr,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2014.26",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 21 17:20:35 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2014:MMH,
  author =       "Anonymous",
  title =        "Membership Matters [House Advertisement]",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "2",
  pages =        "6",
  month =        mar # "\slash " # apr,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2014.27",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 21 17:20:35 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{McGraw:2014:SBTb,
  author =       "Gary McGraw",
  title =        "{Silver Bullet} Talks with {Matthew Green}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "2",
  pages =        "7--10",
  month =        mar # "\slash " # apr,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2014.34",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 21 17:20:35 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Garber:2014:SPPb,
  author =       "Lee Garber",
  title =        "Security, Privacy, Policy, and Dependability Roundup",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "2",
  pages =        "11--13",
  month =        mar # "\slash " # apr,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2014.33",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 21 17:20:35 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Goldrich:2014:MTG,
  author =       "Luanne Goldrich and Carl E. Landwehr",
  title =        "Moving Target [{Guest Editors}' introduction]",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "2",
  pages =        "14--15",
  month =        mar # "\slash " # apr,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2014.29",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 21 17:20:35 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Okhravi:2014:FFB,
  author =       "Hamed Okhravi and Thomas Hobson and David Bigelow and
                 William Streilein",
  title =        "Finding Focus in the Blur of Moving-Target
                 Techniques",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "2",
  pages =        "16--26",
  month =        mar # "\slash " # apr,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.137",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 21 17:20:35 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2014:JBH,
  author =       "Anonymous",
  title =        "Jobs Board [House Advertisement]",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "2",
  pages =        "27",
  month =        mar # "\slash " # apr,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2014.22",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 21 17:20:35 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Fink:2014:DMA,
  author =       "Glenn A. Fink and Jereme N. Haack and A. David
                 McKinnon and Errin W. Fulp",
  title =        "Defense on the Move: Ant-Based Cyber Defense",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "2",
  pages =        "36--43",
  month =        mar # "\slash " # apr,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2014.21",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 21 17:20:35 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Corbett:2014:CIJ,
  author =       "Cherita Corbett and Jason Uher and Jarriel Cook and
                 Angela Dalton",
  title =        "Countering Intelligent Jamming with Full Protocol
                 Stack Agility",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "2",
  pages =        "44--50",
  month =        mar # "\slash " # apr,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.136",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 21 17:20:35 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Sang:2014:TAP,
  author =       "Fernand Lone Sang and Vincent Nicomette and Yves
                 Deswarte",
  title =        "A Tool to Analyze Potential {I/O} Attacks against
                 {PCs}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "2",
  pages =        "60--66",
  month =        mar # "\slash " # apr,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.79",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 21 17:20:35 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Sanders:2014:QSM,
  author =       "William H. Sanders",
  title =        "Quantitative Security Metrics: Unattainable {Holy
                 Grail} or a Vital Breakthrough within Our Reach?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "2",
  pages =        "67--69",
  month =        mar # "\slash " # apr,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2014.31",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 21 17:20:35 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Maimut:2014:AET,
  author =       "Diana Maimut and Reza Reyhanitabar",
  title =        "Authenticated Encryption: Toward Next-Generation
                 Algorithms",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "2",
  pages =        "70--72",
  month =        mar # "\slash " # apr,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2014.19",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 21 17:20:35 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Carvalho:2014:MTD,
  author =       "Marco Carvalho and Richard Ford",
  title =        "Moving-Target Defenses for Computer Networks",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "2",
  pages =        "73--76",
  month =        mar # "\slash " # apr,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2014.30",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 21 17:20:35 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Lesk:2014:CIW,
  author =       "Michael Lesk",
  title =        "{Caller ID}: Whose Privacy?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "2",
  pages =        "77--79",
  month =        mar # "\slash " # apr,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2014.20",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 21 17:20:35 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{DeCristofaro:2014:GPR,
  author =       "Emiliano {De Cristofaro}",
  title =        "Genomic Privacy and the Rise of a New Research
                 Community",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "2",
  pages =        "80--83",
  month =        mar # "\slash " # apr,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2014.24",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 21 17:20:35 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Schneier:2014:MS,
  author =       "Bruce Schneier",
  title =        "Metadata $=$ Surveillance",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "2",
  pages =        "84",
  month =        mar # "\slash " # apr,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2014.28",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 21 17:20:35 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2014:SES,
  author =       "Anonymous",
  title =        "Software Experts Summit [House Advertisement]",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "2",
  pages =        "c3",
  month =        mar # "\slash " # apr,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2014.35",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 21 17:20:35 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2014:RSMb,
  author =       "Anonymous",
  title =        "Rock Stars of Mobile Cloud [House Advertisement]",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "2",
  pages =        "c4",
  month =        mar # "\slash " # apr,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2014.32",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 21 17:20:35 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security and Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2014:FYJa,
  author =       "Anonymous",
  title =        "Focus on Your Job Search [House Advertisement]",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "3",
  pages =        "c2--c2",
  month =        may # "\slash " # jun,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2014.45",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Aug 9 08:53:26 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2014:TCc,
  author =       "Anonymous",
  title =        "Table of Contents",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "3",
  pages =        "1--2",
  month =        may # "\slash " # jun,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2014.56",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Aug 9 08:53:26 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Epstein:2014:POE,
  author =       "Jeremy Epstein",
  title =        "Phishing Our Employees",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "3",
  pages =        "3--4",
  month =        may # "\slash " # jun,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2014.51",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Aug 9 08:53:26 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2014:Mc,
  author =       "Anonymous",
  title =        "{[Masthead]}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "3",
  pages =        "5",
  month =        may # "\slash " # jun,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2014.50",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Aug 9 08:53:26 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Garber:2014:SPPc,
  author =       "Lee Garber",
  title =        "Security, Privacy, Policy, and Dependability Roundup",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "3",
  pages =        "6--8",
  month =        may # "\slash " # jun,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2014.54",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Aug 9 08:53:26 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{McGraw:2014:SBTc,
  author =       "Gary McGraw",
  title =        "{Silver Bullet} Talks with {Yoshi Kohno}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "3",
  pages =        "9--12",
  month =        may # "\slash " # jun,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2014.55",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Aug 9 08:53:26 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Benzel:2014:SMC,
  author =       "Terry Benzel",
  title =        "A Symposium, a Magazine, and a Community [Guest
                 editorial]",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "3",
  pages =        "13--14",
  month =        may # "\slash " # jun,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2014.39",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Aug 9 08:53:26 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Neumann:2014:ISS,
  author =       "Peter G. Neumann and Sean Peisert and Marvin
                 Schaefer",
  title =        "The {IEEE Symposium on Security and Privacy}, in
                 Retrospect",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "3",
  pages =        "15--17",
  month =        may # "\slash " # jun,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2014.59",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Aug 9 08:53:26 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Cybenko:2014:ISP,
  author =       "George Cybenko and Kathy Clark-Fisher",
  title =        "{IEEE Security \& Privacy}: The Early Years",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "3",
  pages =        "18--19",
  month =        may # "\slash " # jun,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2014.48",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Aug 9 08:53:26 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Lee:2014:APP,
  author =       "Michael Z. Lee and Alan M. Dunn and Jonathan Katz and
                 Brent Waters and Emmett Witchel",
  title =        "{Anon-Pass}: Practical Anonymous Subscriptions",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "3",
  pages =        "20--27",
  month =        may # "\slash " # jun,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.158",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Aug 9 08:53:26 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Nikiforakis:2014:WCP,
  author =       "Nick Nikiforakis and Alexandros Kapravelos and Wouter
                 Joosen and Christopher Kruegel and Frank Piessens and
                 Giovanni Vigna",
  title =        "On the Workings and Current Practices of {Web}-Based
                 Device Fingerprinting",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "3",
  pages =        "28--36",
  month =        may # "\slash " # jun,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.160",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Aug 9 08:53:26 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Reardon:2014:SDD,
  author =       "Joel Reardon and David Basin and Srdjan Capkun",
  title =        "On Secure Data Deletion",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "3",
  pages =        "37--44",
  month =        may # "\slash " # jun,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.159",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Aug 9 08:53:26 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Szekeres:2014:EWM,
  author =       "Laszlo Szekeres and Mathias Payer and Lenx Tao Wei and
                 R. Sekar",
  title =        "Eternal War in Memory",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "3",
  pages =        "45--53",
  month =        may # "\slash " # jun,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2014.44",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Aug 9 08:53:26 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Gervais:2014:BDC,
  author =       "Arthur Gervais and Ghassan O. Karame and Vedran Capkun
                 and Srdjan Capkun",
  title =        "Is {Bitcoin} a Decentralized Currency?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "3",
  pages =        "54--60",
  month =        may # "\slash " # jun,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2014.49",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Aug 9 08:53:26 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Mulligan:2014:EIT,
  author =       "Deirdre K. Mulligan",
  title =        "The Enduring Importance of Transparency",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "3",
  pages =        "61--65",
  month =        may # "\slash " # jun,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2014.58",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Aug 9 08:53:26 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Landau:2014:EET,
  author =       "Susan Landau",
  title =        "Educating Engineers: Teaching Privacy in a World of
                 Open Doors",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "3",
  pages =        "66--70",
  month =        may # "\slash " # jun,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2014.43",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Aug 9 08:53:26 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Slomovic:2014:PII,
  author =       "Anna Slomovic",
  title =        "Privacy Issues in Identity Verification",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "3",
  pages =        "71--73",
  month =        may # "\slash " # jun,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2014.52",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Aug 9 08:53:26 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Broz:2014:TDF,
  author =       "Milan Broz and Vashek Matyas",
  title =        "The {TrueCrypt} On-Disk Format --- An Independent
                 View",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "3",
  pages =        "74--77",
  month =        may # "\slash " # jun,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2014.60",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Aug 9 08:53:26 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Lesk:2014:DCS,
  author =       "Michael Lesk",
  title =        "Does the Cloud of Surveillance Have a Silver Lining?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "3",
  pages =        "78--81",
  month =        may # "\slash " # jun,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2014.41",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Aug 9 08:53:26 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Bonebrake:2014:AGT,
  author =       "Chris Bonebrake and Lori Ross O'Neil",
  title =        "Attacks on {GPS} Time Reliability",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "3",
  pages =        "82--84",
  month =        may # "\slash " # jun,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2014.40",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Aug 9 08:53:26 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Ortlieb:2014:AVP,
  author =       "Martin Ortlieb",
  title =        "The Anthropologist's View on Privacy",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "3",
  pages =        "85--87",
  month =        may # "\slash " # jun,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2014.57",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Aug 9 08:53:26 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Bellovin:2014:DS,
  author =       "Steven M. Bellovin",
  title =        "{Dr. Strangecode}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "3",
  pages =        "88",
  month =        may # "\slash " # jun,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2014.42",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Aug 9 08:53:26 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2014:ISPa,
  author =       "Anonymous",
  title =        "{IEEE Security \& Privacy} [Advertisement]",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "3",
  pages =        "c3",
  month =        may # "\slash " # jun,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2014.47",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Aug 9 08:53:26 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2014:RSCa,
  author =       "Anonymous",
  title =        "Rock Stars of Cybersecurity [House Advertisement]",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "3",
  pages =        "c4",
  month =        may # "\slash " # jun,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2014.53",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Aug 9 08:53:26 2014",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2014:TCd,
  author =       "Anonymous",
  title =        "Table of contents",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "4",
  pages =        "1--2",
  month =        jul # "\slash " # aug,
  year =         "2014",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 11 15:40:11 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2014/04/msp2014040001.pdf",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2014/04/msp2014040001-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Landau:2014:SPF,
  author =       "Susan Landau",
  title =        "Security and Privacy: Facing Ethical Choices",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "4",
  pages =        "3--6",
  month =        jul # "\slash " # aug,
  year =         "2014",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 11 15:40:11 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2014/04/msp2014040003.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2014/04/msp2014040003-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2014:Md,
  author =       "Anonymous",
  title =        "{[Masthead]}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "4",
  pages =        "7--7",
  month =        jul # "\slash " # aug,
  year =         "2014",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 11 15:40:11 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2014/04/msp2014040007.pdf",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2014/04/msp2014040007-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Garber:2014:SPPd,
  author =       "Lee Garber",
  title =        "Security, Privacy, Policy, and Dependability Roundup",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "4",
  pages =        "8--10",
  month =        jul # "\slash " # aug,
  year =         "2014",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 11 15:40:11 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2014/04/msp2014040008.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2014/04/msp2014040008-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{McGraw:2014:SBTd,
  author =       "Gary McGraw",
  title =        "{Silver Bullet} Talks with {Nate Fick}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "4",
  pages =        "11--13",
  month =        jul # "\slash " # aug,
  year =         "2014",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 11 15:40:11 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2014/04/msp2014040011.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2014/04/msp2014040011-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Kerr:2014:ALE,
  author =       "Michael Kerr and Ron van Schyndel",
  title =        "Adapting Law Enforcement Frameworks to Address the
                 Ethical Problems of {CCTV} Product Propagation",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "4",
  pages =        "14--21",
  month =        jul # "\slash " # aug,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2014.61",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 11 15:40:11 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2014/04/msp2014040014-abs.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2014/04/msp2014040014-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Garfinkel:2014:CWS,
  author =       "Simson L. Garfinkel and Michael McCarrin",
  title =        "Can We Sniff Wi-Fi?: Implications of {Joffe} v.
                 {Google}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "4",
  pages =        "22--28",
  month =        jul # "\slash " # aug,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2014.64",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 11 15:40:11 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2014/04/msp2014040022-abs.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2014/04/msp2014040022-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Ekberg:2014:UPT,
  author =       "Jan-Erik Ekberg and Kari Kostiainen and N. Asokan",
  title =        "The Untapped Potential of Trusted Execution
                 Environments on Mobile Devices",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "4",
  pages =        "29--37",
  month =        jul # "\slash " # aug,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2014.38",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 11 15:40:11 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2014/04/msp2014040029-abs.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2014/04/msp2014040029-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Kshetri:2014:CDP,
  author =       "Nir Kshetri",
  title =        "{China}'s Data Privacy Regulations: A Tricky Tradeoff
                 between {ICT}'s Productive Utilization and
                 Cybercontrol",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "4",
  pages =        "38--45",
  month =        jul # "\slash " # aug,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.105",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 11 15:40:11 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2014/04/msp2014040038-abs.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2014/04/msp2014040038-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Geer:2014:IMH,
  author =       "Daniel E. Geer and Poul-Henning Kamp",
  title =        "Inviting More Heartbleed",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "4",
  pages =        "46--50",
  month =        jul # "\slash " # aug,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2014.71",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 11 15:40:11 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2014/04/msp2014040046-abs.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2014/04/msp2014040046-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Gellman:2014:WWL,
  author =       "Robert Gellman",
  title =        "{Willis Ware}'s Lasting Contribution to Privacy: Fair
                 Information Practices",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "4",
  pages =        "51--54",
  month =        jul # "\slash " # aug,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2014.82",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 11 15:40:11 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2014/04/msp2014040051-abs.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2014/04/msp2014040051-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Balebako:2014:IAP,
  author =       "Rebecca Balebako and Lorrie Cranor",
  title =        "Improving App Privacy: Nudging App Developers to
                 Protect User Privacy",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "4",
  pages =        "55--58",
  month =        jul # "\slash " # aug,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2014.70",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 11 15:40:11 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2014/04/msp2014040055-abs.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2014/04/msp2014040055-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Juels:2014:HEE,
  author =       "Ari Juels and Thomas Ristenpart",
  title =        "Honey Encryption: Encryption beyond the Brute-Force
                 Barrier",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "4",
  pages =        "59--62",
  month =        jul # "\slash " # aug,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2014.67",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 11 15:40:11 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2014/04/msp2014040059-abs.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2014/04/msp2014040059-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Carvalho:2014:H,
  author =       "Marco Carvalho and Jared DeMott and Richard Ford and
                 David A. Wheeler",
  title =        "{Heartbleed 101}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "4",
  pages =        "63--67",
  month =        jul # "\slash " # aug,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2014.66",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 11 15:40:11 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2014/04/msp2014040063-abs.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2014/04/msp2014040063-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{McDaniel:2014:TSS,
  author =       "Patrick McDaniel and Brian Rivera and Ananthram
                 Swami",
  title =        "Toward a Science of Secure Environments",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "4",
  pages =        "68--70",
  month =        jul # "\slash " # aug,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2014.81",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 11 15:40:11 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2014/04/msp2014040068-abs.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2014/04/msp2014040068-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Lesk:2014:SSD,
  author =       "Michael Lesk",
  title =        "Staffing for Security: Don't Optimize",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "4",
  pages =        "71--73",
  month =        jul # "\slash " # aug,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2014.78",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 11 15:40:11 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2014/04/msp2014040071-abs.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2014/04/msp2014040071-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Pfleeger:2014:EIS,
  author =       "Shari Lawrence Pfleeger",
  title =        "The Eyes Have It: Surveillance and How It Evolved",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "4",
  pages =        "74--79",
  month =        jul # "\slash " # aug,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2014.80",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 11 15:40:11 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2014/04/msp2014040074-abs.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2014/04/msp2014040074-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Bellovin:2014:MPH,
  author =       "Steven M. Bellovin",
  title =        "By Any Means Possible: How Intelligence Agencies Have
                 Gotten Their Data",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "4",
  pages =        "80--84",
  month =        jul # "\slash " # aug,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2014.63",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 11 15:40:11 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2014/04/msp2014040080-abs.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2014/04/msp2014040080-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{DeLong:2014:ACJ,
  author =       "John DeLong",
  title =        "Aligning the Compasses: A Journey through Compliance
                 and Technology",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "4",
  pages =        "85--89",
  month =        jul # "\slash " # aug,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2014.62",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 11 15:40:11 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2014/04/msp2014040085-abs.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2014/04/msp2014040085-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Geer:2014:PDG,
  author =       "Daniel E. Geer",
  title =        "Personal Data and Government Surveillance",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "4",
  pages =        "90--96",
  month =        jul # "\slash " # aug,
  year =         "2014",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 11 15:40:11 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2014/04/msp2014040090.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2014/04/msp2014040090-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2014:FCc,
  author =       "Anonymous",
  title =        "[{Front} cover]",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "4",
  pages =        "c1--c1",
  month =        jul # "\slash " # aug,
  year =         "2014",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 11 15:40:11 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2014/04/msp20140400c1.pdf",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2014/04/msp20140400c1-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2014:ISPb,
  author =       "Anonymous",
  title =        "{IEEE Security \& Privacy} [Advertisement]",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "4",
  pages =        "c3--c3",
  month =        jul # "\slash " # aug,
  year =         "2014",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 11 15:40:11 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2014/04/msp20140400c3.pdf",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2014/04/msp20140400c3-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2014:RSCb,
  author =       "Anonymous",
  title =        "Rock Stars of Cybersecurity [Advertisement]",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "4",
  pages =        "c4--c4",
  month =        jul # "\slash " # aug,
  year =         "2014",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 11 15:40:11 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2014/04/msp20140400c4.pdf",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2014/04/msp20140400c4-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2014:SISb,
  author =       "Anonymous",
  title =        "Seeking {IEEE Security \& Security Editor in Chief}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "4",
  pages =        "c2--c2",
  month =        jul # "\slash " # aug,
  year =         "2014",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 11 15:40:11 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2014/04/msp20140400c2.pdf",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2014/04/msp20140400c2-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2014:TCe,
  author =       "Anonymous",
  title =        "Table of contents",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "5",
  pages =        "1--2",
  month =        sep # "\slash " # oct,
  year =         "2014",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 11 15:40:12 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2014/05/msp2014050001.pdf",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2014/05/msp2014050001-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Pfleeger:2014:EMR,
  author =       "Shari Lawrence Pfleeger",
  title =        "Expanding to Meet Readers' Needs",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "5",
  pages =        "3--4",
  month =        sep # "\slash " # oct,
  year =         "2014",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 11 15:40:12 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2014/05/msp2014050003.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2014/05/msp2014050003-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2014:Me,
  author =       "Anonymous",
  title =        "{[Masthead]}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "5",
  pages =        "5--5",
  month =        sep # "\slash " # oct,
  year =         "2014",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 11 15:40:12 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2014/05/msp2014050005.pdf",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2014/05/msp2014050005-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{McGraw:2014:SBTe,
  author =       "Gary McGraw",
  title =        "{Silver Bullet} Talks with {Bart Miller}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "5",
  pages =        "6--8",
  month =        sep # "\slash " # oct,
  year =         "2014",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 11 15:40:12 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2014/05/msp2014050006.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2014/05/msp2014050006-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Peisert:2014:DSC,
  author =       "Sean Peisert and Jonathan Margulies and David M. Nicol
                 and Himanshu Khurana and Chris Sawall",
  title =        "Designed-in Security for Cyber-Physical Systems",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "5",
  pages =        "9--12",
  month =        sep # "\slash " # oct,
  year =         "2014",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 11 15:40:12 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2014/05/msp2014050009.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2014/05/msp2014050009-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Horne:2014:CSI,
  author =       "Bill Horne",
  title =        "On {Computer Security Incident Response Teams}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "5",
  pages =        "13--15",
  month =        sep # "\slash " # oct,
  year =         "2014",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 11 15:40:12 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2014/05/msp2014050013.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2014/05/msp2014050013-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Ruefle:2014:CSI,
  author =       "Robin Ruefle and Audrey Dorofee and David Mundie and
                 Allen D. Householder and Michael Murray and Samuel J.
                 Perl",
  title =        "{Computer Security Incident Response Team} Development
                 and Evolution",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "5",
  pages =        "16--26",
  month =        sep # "\slash " # oct,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2014.89",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 11 15:40:12 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2014/05/msp2014050016-abs.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2014/05/msp2014050016-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Clark:2014:DAC,
  author =       "Kas Clark and Don Stikvoort and Eelco Stofbergen and
                 Elly van den Heuvel",
  title =        "A {Dutch} Approach to Cybersecurity through
                 Participation",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "5",
  pages =        "27--34",
  month =        sep # "\slash " # oct,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2014.83",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 11 15:40:12 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2014/05/msp2014050027-abs.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2014/05/msp2014050027-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Bhatt:2014:ORS,
  author =       "Sandeep Bhatt and Pratyusa K. Manadhata and Loai
                 Zomlot",
  title =        "The Operational Role of Security Information and Event
                 Management Systems",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "5",
  pages =        "35--41",
  month =        sep # "\slash " # oct,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2014.103",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 11 15:40:12 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2014/05/msp2014050035-abs.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2014/05/msp2014050035-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Kampanakis:2014:SAT,
  author =       "Panos Kampanakis",
  title =        "Security Automation and Threat Information-Sharing
                 Options",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "5",
  pages =        "42--51",
  month =        sep # "\slash " # oct,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2014.99",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 11 15:40:12 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2014/05/msp2014050042-abs.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2014/05/msp2014050042-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Sundaramurthy:2014:AAS,
  author =       "Sathya Chandran Sundaramurthy and John McHugh and
                 Xinming Simon Ou and S. Raj Rajagopalan and Michael
                 Wesch",
  title =        "An Anthropological Approach to Studying {CSIRTs}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "5",
  pages =        "52--60",
  month =        sep # "\slash " # oct,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2014.84",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 11 15:40:12 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2014/05/msp2014050052-abs.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2014/05/msp2014050052-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Chen:2014:OPP,
  author =       "Tiffani R. Chen and Daniel B. Shore and Stephen J.
                 Zaccaro and Reeshad S. Dalal and Lois E. Tetrick and
                 Aiva K. Gorab",
  title =        "An Organizational Psychology Perspective to Examining
                 {Computer Security Incident Response Teams}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "5",
  pages =        "61--67",
  month =        sep # "\slash " # oct,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2014.85",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 11 15:40:12 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2014/05/msp2014050061-abs.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2014/05/msp2014050061-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Gilad:2014:PHI,
  author =       "Yossi Gilad and Amir Herzberg and Haya Shulman",
  title =        "Off-Path Hacking: The Illusion of Challenge--Response
                 Authentication",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "5",
  pages =        "68--77",
  month =        sep # "\slash " # oct,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.130",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 11 15:40:12 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2014/05/msp2014050068-abs.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2014/05/msp2014050068-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Evans:2014:WWM,
  author =       "Katrine Evans",
  title =        "Where in the World Is My Information?: Giving People
                 Access to Their Data",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "5",
  pages =        "78--81",
  month =        sep # "\slash " # oct,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2014.104",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 11 15:40:12 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2014/05/msp2014050078-abs.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2014/05/msp2014050078-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Pham:2014:BRS,
  author =       "Cuong Pham and Zachary J. Estrada and Phuong Cao and
                 Zbigniew Kalbarczyk and Ravishankar K. Iyer",
  title =        "Building Reliable and Secure {Virtual Machines} Using
                 Architectural Invariants",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "5",
  pages =        "82--85",
  month =        sep # "\slash " # oct,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2014.87",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 11 15:40:12 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2014/05/msp2014050082-abs.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2014/05/msp2014050082-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{MacKie-Mason:2014:CWA,
  author =       "Jeffrey MacKie-Mason",
  title =        "Can We Afford Privacy from Surveillance?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "5",
  pages =        "86--89",
  month =        sep # "\slash " # oct,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2014.88",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 11 15:40:12 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2014/05/msp2014050086-abs.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2014/05/msp2014050086-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Beuhring:2014:BBC,
  author =       "Aaron Beuhring and Kyle Salous",
  title =        "Beyond Blacklisting: Cyberdefense in the Era of
                 Advanced Persistent Threats",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "5",
  pages =        "90--93",
  month =        sep # "\slash " # oct,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2014.86",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 11 15:40:12 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2014/05/msp2014050090-abs.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2014/05/msp2014050090-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2014:IA,
  author =       "Anonymous",
  title =        "Intelect [Advertisement]",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "5",
  pages =        "94--94",
  month =        sep # "\slash " # oct,
  year =         "2014",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 11 15:40:12 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2014/05/msp2014050094.pdf",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2014/05/msp2014050094-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Schneier:2014:FIR,
  author =       "Bruce Schneier",
  title =        "The Future of Incident Response",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "5",
  pages =        "96--96",
  month =        sep # "\slash " # oct,
  year =         "2014",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 11 15:40:12 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2014/05/msp2014050096.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2014/05/msp2014050096-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2014:CSA,
  author =       "Anonymous",
  title =        "Co3 Systems Advertisement",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "5",
  pages =        "c2--c2",
  month =        sep # "\slash " # oct,
  year =         "2014",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 11 15:40:12 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2014/05/msp20140500c2.pdf",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2014/05/msp20140500c2-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2014:ISPc,
  author =       "Anonymous",
  title =        "{IEEE Security \& Privacy} [Advertisement]",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "5",
  pages =        "c3--c3",
  month =        sep # "\slash " # oct,
  year =         "2014",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 11 15:40:12 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2014/05/msp20140500c3.pdf",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2014/05/msp20140500c3-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2014:RSB,
  author =       "Anonymous",
  title =        "Rock Stars of Big Data Analytics [Advertisement]",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "5",
  pages =        "c4--c4",
  month =        sep # "\slash " # oct,
  year =         "2014",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 11 15:40:12 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2014/05/msp20140500c4.pdf",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2014/05/msp20140500c4-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2014:TCf,
  author =       "Anonymous",
  title =        "Table of contents",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "6",
  pages =        "1--2",
  month =        nov # "\slash " # dec,
  year =         "2014",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 11 15:40:12 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2014/06/msp2014060001.pdf",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2014/06/msp2014060001-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Pfleeger:2014:TTT,
  author =       "Shari Lawrence Pfleeger",
  title =        "Technology, Transparency, and Trust",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "6",
  pages =        "3--5",
  month =        nov # "\slash " # dec,
  year =         "2014",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 11 15:40:12 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2014/06/msp2014060003.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2014/06/msp2014060003-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2014:Mf,
  author =       "Anonymous",
  title =        "{[Masthead]}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "6",
  pages =        "6--6",
  month =        nov # "\slash " # dec,
  year =         "2014",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 11 15:40:12 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2014/06/msp2014060006.pdf",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2014/06/msp2014060006-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2014:RT,
  author =       "Anonymous",
  title =        "Reviewer Thanks",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "6",
  pages =        "7--8",
  month =        nov # "\slash " # dec,
  year =         "2014",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 11 15:40:12 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2014/06/msp2014060007.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2014/06/msp2014060007-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{McGraw:2014:SBTf,
  author =       "Gary McGraw",
  title =        "{Silver Bullet} Talks with the {IEEE Center for Secure
                 Design}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "6",
  pages =        "9--12",
  month =        nov # "\slash " # dec,
  year =         "2014",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 11 15:40:12 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2014/06/msp2014060009.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2014/06/msp2014060009-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Peisert:2014:CGS,
  author =       "Sean Peisert and Jonathan Margulies",
  title =        "Closing the Gap on Securing Energy Sector Control
                 Systems [{Guest Editors}' introduction]",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "6",
  pages =        "13--14",
  month =        nov # "\slash " # dec,
  year =         "2014",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 11 15:40:12 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2014/06/msp2014060013.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2014/06/msp2014060013-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Barreto:2014:CSP,
  author =       "Carlos Barreto and Jairo Giraldo and Alvaro A.
                 Cardenas and Eduardo Mojica-Nava and Nicanor Quijano",
  title =        "Control Systems for the Power Grid and Their
                 Resiliency to Attacks",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "6",
  pages =        "15--23",
  month =        nov # "\slash " # dec,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2014.111",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 11 15:40:12 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2014/06/msp2014060015-abs.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2014/06/msp2014060015-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Schwartz:2014:ETF,
  author =       "Moses Schwartz and John Mulder and Adrian R. Chavez
                 and Benjamin A. Allan",
  title =        "Emerging Techniques for Field Device Security",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "6",
  pages =        "24--31",
  month =        nov # "\slash " # dec,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2014.114",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 11 15:40:12 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2014/06/msp2014060024-abs.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2014/06/msp2014060024-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{McParland:2014:MSN,
  author =       "Chuck McParland and Sean Peisert and Anna Scaglione",
  title =        "Monitoring Security of Networked Control Systems: It's
                 the Physics",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "6",
  pages =        "32--39",
  month =        nov # "\slash " # dec,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2014.122",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 11 15:40:12 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2014/06/msp2014060032-abs.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2014/06/msp2014060032-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Zonouz:2014:DIC,
  author =       "Saman Zonouz and Julian Rrushi and Stephen
                 McLaughlin",
  title =        "Detecting Industrial Control Malware Using Automated
                 {PLC} Code Analytics",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "6",
  pages =        "40--47",
  month =        nov # "\slash " # dec,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2014.113",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 11 15:40:12 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2014/06/msp2014060040-abs.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2014/06/msp2014060040-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Ellis:2014:RCI,
  author =       "Ryan Ellis",
  title =        "Regulating Cybersecurity: Institutional Learning or a
                 Lesson in Futility?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "6",
  pages =        "48--54",
  month =        nov # "\slash " # dec,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2014.124",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 11 15:40:12 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2014/06/msp2014060048-abs.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2014/06/msp2014060048-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Peisert:2014:CSS,
  author =       "Sean Peisert and Jonathan Margulies and Eric Byres and
                 Paul Dorey and Dale Peterson and Zach Tudor",
  title =        "Control Systems Security from the Front Lines",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "6",
  pages =        "55--58",
  month =        nov # "\slash " # dec,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2014.112",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 11 15:40:12 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2014/06/msp2014060055-abs.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2014/06/msp2014060055-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Dechesne:2014:EIS,
  author =       "Francien Dechesne and Dina Hadziosmanovic and Wolter
                 Pieters",
  title =        "Experimenting with Incentives: Security in Pilots for
                 Future Grids",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "6",
  pages =        "59--66",
  month =        nov # "\slash " # dec,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2014.115",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 11 15:40:12 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2014/06/msp2014060059-abs.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2014/06/msp2014060059-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2014:ICS,
  author =       "Anonymous",
  title =        "{IEEE Computer Society} [Advertisement]",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "6",
  pages =        "67--67",
  month =        nov # "\slash " # dec,
  year =         "2014",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 11 15:40:12 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2014/06/msp2014060067.pdf",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2014/06/msp2014060067-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Ryoo:2014:CSA,
  author =       "Jungwoo Ryoo and Syed Rizvi and William Aiken and John
                 Kissell",
  title =        "Cloud Security Auditing: Challenges and Emerging
                 Approaches",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "6",
  pages =        "68--74",
  month =        nov # "\slash " # dec,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.132",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 11 15:40:12 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2014/06/msp2014060068-abs.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2014/06/msp2014060068-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Kargl:2014:ISD,
  author =       "Frank Kargl and Rens W. van der Heijden and Hartmut
                 Konig and Alfonso Valdes and Marc C. Dacier",
  title =        "Insights on the Security and Dependability of
                 Industrial Control Systems",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "6",
  pages =        "75--78",
  month =        nov # "\slash " # dec,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2014.120",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 11 15:40:12 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2014/06/msp2014060075-abs.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2014/06/msp2014060075-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Dark:2014:ACE,
  author =       "Melissa Dark",
  title =        "Advancing Cybersecurity Education",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "6",
  pages =        "79--83",
  month =        nov # "\slash " # dec,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2014.108",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 11 15:40:12 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2014/06/msp2014060079-abs.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2014/06/msp2014060079-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Grossman:2014:EUN,
  author =       "Wendy M. Grossman",
  title =        "{``Emergency''} Ushers in a New Era in {British}
                 Communications Surveillance",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "6",
  pages =        "84--88",
  month =        nov # "\slash " # dec,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2014.106",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 11 15:40:12 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2014/06/msp2014060084-abs.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2014/06/msp2014060084-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Cranor:2014:BTU,
  author =       "Lorrie Faith Cranor and Norbou Buchler",
  title =        "Better Together: Usability and Security Go Hand in
                 Hand",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "6",
  pages =        "89--93",
  month =        nov # "\slash " # dec,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2014.109",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 11 15:40:12 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2014/06/msp2014060089-abs.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2014/06/msp2014060089-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Lesk:2014:TV,
  author =       "Michael Lesk",
  title =        "Trust, but Verify",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "6",
  pages =        "94--96",
  month =        nov # "\slash " # dec,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2014.130",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 11 15:40:12 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2014/06/msp2014060094-abs.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2014/06/msp2014060094-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Bauer:2014:PUF,
  author =       "Todd Bauer and Jason Hamlet",
  title =        "Physical Unclonable Functions: A Primer",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "6",
  pages =        "97--101",
  month =        nov # "\slash " # dec,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2014.123",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 11 15:40:12 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2014/06/msp2014060097-abs.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2014/06/msp2014060097-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Edelman:2014:APS,
  author =       "Benjamin Edelman",
  title =        "Accountable? {The} Problems and Solutions of Online Ad
                 Optimization",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "6",
  pages =        "102--107",
  month =        nov # "\slash " # dec,
  year =         "2014",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2014.107",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 11 15:40:12 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2014/06/msp2014060102-abs.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2014/06/msp2014060102-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Bellovin:2014:WSC,
  author =       "Steven M. Bellovin",
  title =        "What Should Crypto Look Like?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "6",
  pages =        "108--108",
  month =        nov # "\slash " # dec,
  year =         "2014",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 11 15:40:12 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2014/06/msp2014060108.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2014/06/msp2014060108-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2014:A,
  author =       "Anonymous",
  title =        "{[Advertisement]}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "6",
  pages =        "c4--c4",
  month =        nov # "\slash " # dec,
  year =         "2014",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 11 15:40:12 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2014/06/msp20140600c4.pdf",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2014/06/msp20140600c4-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2014:FCd,
  author =       "Anonymous",
  title =        "[{Front} cover]",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "6",
  pages =        "c1--c1",
  month =        nov # "\slash " # dec,
  year =         "2014",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 11 15:40:12 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2014/06/msp20140600c1.pdf",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2014/06/msp20140600c1-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2014:FYJb,
  author =       "Anonymous",
  title =        "Focus on Your Job Search [Advertisement]",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "6",
  pages =        "c2--c2",
  month =        nov # "\slash " # dec,
  year =         "2014",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 11 15:40:12 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2014/06/msp20140600c2.pdf",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2014/06/msp20140600c2-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2014:ISPd,
  author =       "Anonymous",
  title =        "{IEEE} Security \& Privacy [Advertisement]",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "12",
  number =       "6",
  pages =        "c3--c3",
  month =        nov # "\slash " # dec,
  year =         "2014",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 11 15:40:12 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2014/06/msp20140600c3.pdf",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2014/06/msp20140600c3-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Horne:2015:UO,
  author =       "Bill Horne",
  title =        "Umbrellas and Octopuses",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "1",
  pages =        "3--5",
  month =        jan # "\slash " # feb,
  year =         "2015",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 11 15:40:13 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2015/01/msp2015010003.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2015/01/msp2015010003-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2015:Ma,
  author =       "Anonymous",
  title =        "Masthead",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "1",
  pages =        "6--6",
  month =        jan # "\slash " # feb,
  year =         "2015",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 11 15:40:13 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2015/01/msp2015010006.pdf",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2015/01/msp2015010006-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{McGraw:2015:SBTa,
  author =       "Gary McGraw",
  title =        "{Silver Bullet} Talks with {Brian Krebs}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "1",
  pages =        "7--11",
  month =        jan # "\slash " # feb,
  year =         "2015",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 11 15:40:13 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2015/01/msp2015010007.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2015/01/msp2015010007-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Orman:2015:MPB,
  author =       "Hilarie Orman and Charles P. Pfleeger",
  title =        "Mathematics and Physics Build a New Future for Secure
                 Communication [{Guest Editors}' introduction]",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "1",
  pages =        "12--13",
  month =        jan # "\slash " # feb,
  year =         "2015",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 11 15:40:13 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2015/01/msp2015010012.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2015/01/msp2015010012-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Trappe:2015:LES,
  author =       "Wade Trappe and Richard Howard and Robert S. Moore",
  title =        "Low-Energy Security: Limits and Opportunities in the
                 {Internet of Things}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "1",
  pages =        "14--21",
  month =        jan # "\slash " # feb,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2015.7",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 11 15:40:13 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2015/01/msp2015010014-abs.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2015/01/msp2015010014-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Archer:2015:CDP,
  author =       "David W. Archer and Kurt Rohloff",
  title =        "Computing with Data Privacy: Steps toward
                 Realization",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "1",
  pages =        "22--29",
  month =        jan # "\slash " # feb,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2015.3",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 11 15:40:13 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2015/01/msp2015010022-abs.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2015/01/msp2015010022-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Mailloux:2015:PEQ,
  author =       "Logan O. Mailloux and Michael R. Grimaila and Douglas
                 D. Hodson and Gerald Baumgartner and Colin McLaughlin",
  title =        "Performance Evaluations of Quantum Key Distribution
                 System Architectures",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "1",
  pages =        "30--40",
  month =        jan # "\slash " # feb,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2015.11",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 11 15:40:13 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2015/01/msp2015010030-abs.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2015/01/msp2015010030-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Boureanu:2015:CDB,
  author =       "Ioana Boureanu and Serge Vaudenay",
  title =        "Challenges in Distance Bounding",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "1",
  pages =        "41--48",
  month =        jan # "\slash " # feb,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2015.2",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 11 15:40:13 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2015/01/msp2015010041-abs.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2015/01/msp2015010041-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Maybury:2015:TAC,
  author =       "Mark Maybury",
  title =        "Toward the Assured Cyberspace Advantage: {Air Force
                 Cyber Vision 2025}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "1",
  pages =        "49--56",
  month =        jan # "\slash " # feb,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.135",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 11 15:40:13 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2015/01/msp2015010049-abs.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2015/01/msp2015010049-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Padilha:2015:CC,
  author =       "Ricardo Padilha and Fernando Pedone",
  title =        "Confidentiality in the Cloud",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "1",
  pages =        "57--60",
  month =        jan # "\slash " # feb,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2015.4",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 11 15:40:13 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2015/01/msp2015010057-abs.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2015/01/msp2015010057-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Dark:2015:TAC,
  author =       "Melissa Dark",
  title =        "Thinking about Cybersecurity",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "1",
  pages =        "61--65",
  month =        jan # "\slash " # feb,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2015.17",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 11 15:40:13 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2015/01/msp2015010061-abs.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2015/01/msp2015010061-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Simion:2015:RST,
  author =       "Emil Simion",
  title =        "The Relevance of Statistical Tests in Cryptography",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "1",
  pages =        "66--70",
  month =        jan # "\slash " # feb,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2015.16",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 11 15:40:13 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2015/01/msp2015010066-abs.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2015/01/msp2015010066-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Arief:2015:UCSa,
  author =       "Budi Arief and Mohd Azeem Bin Adzmi and Thomas Gross",
  title =        "Understanding Cybercrime from Its Stakeholders'
                 Perspectives: {Part 1} --- Attackers",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "1",
  pages =        "71--76",
  month =        jan # "\slash " # feb,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2015.19",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 11 15:40:13 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2015/01/msp2015010071-abs.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2015/01/msp2015010071-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Telang:2015:PFD,
  author =       "Rahul Telang",
  title =        "Policy Framework for Data Breaches",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "1",
  pages =        "77--79",
  month =        jan # "\slash " # feb,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2015.12",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 11 15:40:13 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2015/01/msp2015010077-abs.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2015/01/msp2015010077-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Geer:2015:LMS,
  author =       "Daniel E. {Geer, Jr.}",
  title =        "Less Is More: Saving the {Internet} from Itself",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "1",
  pages =        "80--80",
  month =        jan # "\slash " # feb,
  year =         "2015",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 11 15:40:13 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2015/01/msp2015010080.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2015/01/msp2015010080-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2015:ABS,
  author =       "Anonymous",
  title =        "{3rd Annual Best Scientific Cybersecurity Paper
                 Competition} [House Advertisement]",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "1",
  pages =        "c4--c4",
  month =        jan # "\slash " # feb,
  year =         "2015",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 11 15:40:13 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2015/01/msp20150100c4.pdf",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2015/01/msp20150100c4-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2015:FCa,
  author =       "Anonymous",
  title =        "Front Cover",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "1",
  pages =        "c1--c1",
  month =        jan # "\slash " # feb,
  year =         "2015",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 11 15:40:13 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2015/01/msp20150100c1.pdf",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2015/01/msp20150100c1-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2015:MYC,
  author =       "Anonymous",
  title =        "Mark Your Calendars [House Advertisement]",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "1",
  pages =        "c2--c2",
  month =        jan # "\slash " # feb,
  year =         "2015",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 11 15:40:13 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2015/01/msp20150100c2.pdf",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2015/01/msp20150100c2-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2015:SRS,
  author =       "Anonymous",
  title =        "Startup Rock Stars [House Advertisement]",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "1",
  pages =        "c3--c3",
  month =        jan # "\slash " # feb,
  year =         "2015",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Feb 11 15:40:13 MST 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2015/01/msp20150100c3.pdf",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2015/01/msp20150100c3-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Epstein:2015:WLT,
  author =       "Jeremy Epstein",
  title =        "The Whole Is Less than the Sum of the Parts",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "2",
  pages =        "3--5",
  month =        mar # "\slash " # apr,
  year =         "2015",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jun 4 19:11:45 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2015/02/msp2015020003.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2015/02/msp2015020003-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2015:Mb,
  author =       "Anonymous",
  title =        "Masthead",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "2",
  pages =        "6--6",
  month =        mar # "\slash " # apr,
  year =         "2015",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jun 4 19:11:45 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2015/02/msp2015020006.pdf",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2015/02/msp2015020006-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{McGraw:2015:SBTb,
  author =       "Gary McGraw",
  title =        "{Silver Bullet} Talks with {Whitfield Diffie}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "2",
  pages =        "7--10",
  month =        mar # "\slash " # apr,
  year =         "2015",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jun 4 19:11:45 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2015/02/msp2015020007.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2015/02/msp2015020007-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2015:AIC,
  author =       "Anonymous",
  title =        "{39th Annual International Computers, Software \&
                 Applications Conference} House Advertisement",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "2",
  pages =        "11--11",
  month =        mar # "\slash " # apr,
  year =         "2015",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jun 4 19:11:45 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2015/02/msp2015020011.pdf",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2015/02/msp2015020011-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Benzel:2015:ESL,
  author =       "Terry Benzel",
  title =        "An Enduring Symposium for Leading Research in Security
                 and Privacy",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "2",
  pages =        "12--13",
  month =        mar # "\slash " # apr,
  year =         "2015",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jun 4 19:11:45 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2015/02/msp2015020012.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2015/02/msp2015020012-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Peddinti:2015:USA,
  author =       "Sai Teja Peddinti and Aleksandra Korolova and Elie
                 Bursztein and Geetanjali Sampemane",
  title =        "Understanding Sensitivity by Analyzing Anonymity
                 [{Guest Editor}'s introduction]",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "2",
  pages =        "14--21",
  month =        mar # "\slash " # apr,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2015.45",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jun 4 19:11:45 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2015/02/msp2015020014-abs.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2015/02/msp2015020014-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Hohenberger:2015:OAL,
  author =       "Susan Hohenberger and Steven Myers and Rafael Pass and
                 Abhi Shelat",
  title =        "An Overview of {ANONIZE}: A Large-Scale Anonymous
                 Survey System",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "2",
  pages =        "22--29",
  month =        mar # "\slash " # apr,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2015.21",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jun 4 19:11:45 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2015/02/msp2015020022-abs.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2015/02/msp2015020022-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Larsen:2015:ASD,
  author =       "Per Larsen and Stefan Brunthaler and Michael Franz",
  title =        "Automatic Software Diversity",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "2",
  pages =        "30--37",
  month =        mar # "\slash " # apr,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2015.23",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jun 4 19:11:45 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2015/02/msp2015020030-abs.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2015/02/msp2015020030-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Zhou:2015:DGW,
  author =       "Zongwei Zhou and Miao Yu and Virgil D. Gligor",
  title =        "Dancing with Giants: Wimpy Kernels for On-Demand {I/O}
                 Isolation",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "2",
  pages =        "38--46",
  month =        mar # "\slash " # apr,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2015.26",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jun 4 19:11:45 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2015/02/msp2015020038-abs.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2015/02/msp2015020038-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2015:FYJa,
  author =       "Anonymous",
  title =        "Focus on Your Job Search House Advertisement",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "2",
  pages =        "47--47",
  month =        mar # "\slash " # apr,
  year =         "2015",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jun 4 19:11:45 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2015/02/msp2015020047.pdf",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2015/02/msp2015020047-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Jain:2015:ISG,
  author =       "Bhushan Jain and Mirza Basim Baig and Dongli Zhang and
                 Donald E. Porter and Radu Sion",
  title =        "Introspections on the Semantic Gap",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "2",
  pages =        "48--55",
  month =        mar # "\slash " # apr,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2015.35",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jun 4 19:11:45 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2015/02/msp2015020048-abs.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2015/02/msp2015020048-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Bond:2015:PEP,
  author =       "Mike Bond and Marios O. Choudary and Steven J. Murdoch
                 and Sergei Skorobogatov and Ross Anderson",
  title =        "Be Prepared: The {EMV} Preplay Attack",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "2",
  pages =        "56--64",
  month =        mar # "\slash " # apr,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2015.24",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jun 4 19:11:45 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2015/02/msp2015020056-abs.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2015/02/msp2015020056-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Lenders:2015:GEC,
  author =       "Vincent Lenders and Axel Tanner and Albert Blarer",
  title =        "Gaining an Edge in Cyberspace with Advanced
                 Situational Awareness",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "2",
  pages =        "65--74",
  month =        mar # "\slash " # apr,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2015.30",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jun 4 19:11:45 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2015/02/msp2015020065-abs.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2015/02/msp2015020065-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Dark:2015:ETP,
  author =       "Melissa Dark and Jelena Mirkovic",
  title =        "Evaluation Theory and Practice Applied to
                 Cybersecurity Education",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "2",
  pages =        "75--80",
  month =        mar # "\slash " # apr,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2015.27",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jun 4 19:11:45 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2015/02/msp2015020075-abs.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2015/02/msp2015020075-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Steel:2015:APF,
  author =       "Graham Steel",
  title =        "Automated Proof and Flaw-Finding Tools in
                 Cryptography",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "2",
  pages =        "81--83",
  month =        mar # "\slash " # apr,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2015.22",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jun 4 19:11:45 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2015/02/msp2015020081-abs.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2015/02/msp2015020081-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Arief:2015:UCSb,
  author =       "Budi Arief and Mohd Azeem Bin Adzmi",
  title =        "Understanding Cybercrime from Its Stakeholders'
                 Perspectives: {Part 2} --- Defenders and Victims",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "2",
  pages =        "84--88",
  month =        mar # "\slash " # apr,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2015.44",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jun 4 19:11:45 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2015/02/msp2015020084-abs.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2015/02/msp2015020084-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Mazurczyk:2015:IHC,
  author =       "Wojciech Mazurczyk and Luca Caviglione",
  title =        "Information Hiding as a Challenge for Malware
                 Detection",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "2",
  pages =        "89--93",
  month =        mar # "\slash " # apr,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2015.33",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jun 4 19:11:45 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2015/02/msp2015020089-abs.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2015/02/msp2015020089-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Smith:2015:NMP,
  author =       "Sean W. Smith and John S. Erickson",
  title =        "Never Mind {Pearl Harbor} --- What about a {Cyber Love
                 Canal}?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "2",
  pages =        "94--98",
  month =        mar # "\slash " # apr,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2015.37",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jun 4 19:11:45 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2015/02/msp2015020094-abs.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2015/02/msp2015020094-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Lesk:2015:SRH,
  author =       "Michael Lesk",
  title =        "Safety Risks --- Human Error or Mechanical Failure?:
                 Lessons from Railways",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "2",
  pages =        "99--102",
  month =        mar # "\slash " # apr,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2015.39",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jun 4 19:11:45 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2015/02/msp2015020099-abs.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2015/02/msp2015020099-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Borgesius:2015:ICW,
  author =       "Frederik Zuiderveen Borgesius",
  title =        "Informed Consent: We Can Do Better to Defend Privacy",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "2",
  pages =        "103--107",
  month =        mar # "\slash " # apr,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2015.34",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jun 4 19:11:45 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2015/02/msp2015020103-abs.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2015/02/msp2015020103-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Schneier:2015:SVM,
  author =       "Bruce Schneier",
  title =        "The Security Value of Muddling Through",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "2",
  pages =        "108--108",
  month =        mar # "\slash " # apr,
  year =         "2015",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jun 4 19:11:45 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2015/02/msp2015020108.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2015/02/msp2015020108-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2015:FCb,
  author =       "Anonymous",
  title =        "Front Cover",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "2",
  pages =        "c1--c1",
  month =        mar # "\slash " # apr,
  year =         "2015",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jun 4 19:11:45 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2015/02/msp20150200c1.pdf",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2015/02/msp20150200c1-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2015:GMLa,
  author =       "Anonymous",
  title =        "Get More, for Less! {House} Advertisement",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "2",
  pages =        "c4--c4",
  month =        mar # "\slash " # apr,
  year =         "2015",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jun 4 19:11:45 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2015/02/msp20150200c4.pdf",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2015/02/msp20150200c4-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2015:ISPa,
  author =       "Anonymous",
  title =        "{IEEE Security \& Privacy} House Advertisement",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "2",
  pages =        "c3--c3",
  month =        mar # "\slash " # apr,
  year =         "2015",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jun 4 19:11:45 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2015/02/msp20150200c3.pdf",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2015/02/msp20150200c3-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2015:RSCa,
  author =       "Anonymous",
  title =        "Rock Stars of Cyber Security {[Advertisement]}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "2",
  pages =        "c2--c2",
  month =        mar # "\slash " # apr,
  year =         "2015",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Jun 4 19:11:45 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2015/02/msp20150200c2.pdf",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2015/02/msp20150200c2-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Landau:2015:WWS,
  author =       "Susan Landau",
  title =        "What Was {Samsung} Thinking?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "3",
  pages =        "3--4",
  month =        may # "\slash " # jun,
  year =         "2015",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Aug 3 11:45:33 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2015/03/msp2015030003.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2015/03/msp2015030003-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{McGraw:2015:SBTc,
  author =       "Gary McGraw",
  title =        "{Silver Bullet} Talks with {L. Jean Camp}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "3",
  pages =        "5--7",
  month =        may # "\slash " # jun,
  year =         "2015",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Aug 3 11:45:33 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2015/03/msp2015030005.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2015/03/msp2015030005-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2015:Mc,
  author =       "Anonymous",
  title =        "Masthead",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "3",
  pages =        "8--8",
  month =        may # "\slash " # jun,
  year =         "2015",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Aug 3 11:45:33 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2015/03/msp2015030008.pdf",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2015/03/msp2015030008-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Dellios:2015:ISC,
  author =       "Kleanthis Dellios and Dimitrios Papanikas and Despina
                 Polemi",
  title =        "Information Security Compliance over Intelligent
                 Transport Systems: Is {IT} Possible?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "3",
  pages =        "9--15",
  month =        may # "\slash " # jun,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2015.59",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Aug 3 11:45:33 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2015/03/msp2015030009-abs.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2015/03/msp2015030009-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Kshetri:2015:ICL,
  author =       "Nir Kshetri",
  title =        "{India}'s Cybersecurity Landscape: The Roles of the
                 Private Sector and Public-Private Partnership",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "3",
  pages =        "16--23",
  month =        may # "\slash " # jun,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2015.61",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Aug 3 11:45:33 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2015/03/msp2015030016-abs.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2015/03/msp2015030016-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Basin:2015:ISC,
  author =       "David Basin and Cas Cremers and Kunihiko Miyazaki and
                 Sasa Radomirovic and Dai Watanabe",
  title =        "Improving the Security of Cryptographic Protocol
                 Standards",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "3",
  pages =        "24--31",
  month =        may # "\slash " # jun,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.162",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Aug 3 11:45:33 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2015/03/msp2015030024-abs.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2015/03/msp2015030024-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Arias-Cabarcos:2015:BIP,
  author =       "Patricia Arias-Cabarcos and Florina Almenarez and
                 Ruben Trapero and Daniel Diaz-Sanchez and Andres
                 Marin",
  title =        "Blended Identity: Pervasive {IdM} for Continuous
                 Authentication",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "3",
  pages =        "32--39",
  month =        may # "\slash " # jun,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2015.62",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Aug 3 11:45:33 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2015/03/msp2015030032-abs.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2015/03/msp2015030032-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Turner:2015:BPO,
  author =       "Hamilton Turner and Jules White and Jaime A. Camelio
                 and Christopher Williams and Brandon Amos and Robert
                 Parker",
  title =        "Bad Parts: Are Our Manufacturing Systems at Risk of
                 Silent Cyberattacks?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "3",
  pages =        "40--47",
  month =        may # "\slash " # jun,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2015.60",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Aug 3 11:45:33 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2015/03/msp2015030040-abs.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2015/03/msp2015030040-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Hole:2015:DRI,
  author =       "Kjell Jorgen Hole",
  title =        "Diversity Reduces the Impact of Malware",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "3",
  pages =        "48--54",
  month =        may # "\slash " # jun,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2013.48",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Aug 3 11:45:33 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2015/03/msp2015030048-abs.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2015/03/msp2015030048-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Epstein:2015:WDV,
  author =       "Jeremy Epstein",
  title =        "Weakness in Depth: A Voting Machine's Demise",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "3",
  pages =        "55--58",
  month =        may # "\slash " # jun,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2015.46",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Aug 3 11:45:33 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2015/03/msp2015030055-abs.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2015/03/msp2015030055-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Ryan:2015:EEV,
  author =       "Peter Y. A. Ryan and Steve Schneider and Vanessa
                 Teague",
  title =        "End-to-End Verifiability in Voting Systems, from
                 Theory to Practice",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "3",
  pages =        "59--62",
  month =        may # "\slash " # jun,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2015.54",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Aug 3 11:45:33 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2015/03/msp2015030059-abs.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2015/03/msp2015030059-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Mirkovic:2015:ECE,
  author =       "Jelena Mirkovic and Melissa Dark and Wenliang Du and
                 Giovanni Vigna and Tamara Denning",
  title =        "Evaluating Cybersecurity Education Interventions:
                 Three Case Studies",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "3",
  pages =        "63--69",
  month =        may # "\slash " # jun,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2015.57",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Aug 3 11:45:33 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2015/03/msp2015030063-abs.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2015/03/msp2015030063-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Mayron:2015:BAM,
  author =       "Liam M. Mayron",
  title =        "Biometric Authentication on Mobile Devices",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "3",
  pages =        "70--73",
  month =        may # "\slash " # jun,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2015.67",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Aug 3 11:45:33 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2015/03/msp2015030070-abs.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2015/03/msp2015030070-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Crain:2015:BSE,
  author =       "J. Adam Crain and Sergey Bratus",
  title =        "Bolt-On Security Extensions for Industrial Control
                 System Protocols: A Case Study of {DNP3 SAv5}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "3",
  pages =        "74--79",
  month =        may # "\slash " # jun,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2015.47",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Aug 3 11:45:33 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2015/03/msp2015030074-abs.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2015/03/msp2015030074-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Sasse:2015:SBP,
  author =       "Angela Sasse",
  title =        "Scaring and Bullying People into Security Won't Work",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "3",
  pages =        "80--83",
  month =        may # "\slash " # jun,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2015.65",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Aug 3 11:45:33 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2015/03/msp2015030080-abs.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2015/03/msp2015030080-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Margulies:2015:DGA,
  author =       "Jonathan Margulies",
  title =        "A Developer's Guide to Audit Logging",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "3",
  pages =        "84--86",
  month =        may # "\slash " # jun,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2015.50",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Aug 3 11:45:33 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2015/03/msp2015030084-abs.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2015/03/msp2015030084-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2015:FYJb,
  author =       "Anonymous",
  title =        "Focus on Your Job Search House Advertisement",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "3",
  pages =        "87--87",
  month =        may # "\slash " # jun,
  year =         "2015",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Aug 3 11:45:33 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2015/03/msp2015030087.pdf",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2015/03/msp2015030087-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Krol:2015:EPN,
  author =       "Kat Krol and Soren Preibusch",
  title =        "Effortless Privacy Negotiations",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "3",
  pages =        "88--91",
  month =        may # "\slash " # jun,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2015.51",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Aug 3 11:45:33 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2015/03/msp2015030088-abs.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2015/03/msp2015030088-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Bellovin:2015:WRC,
  author =       "Steven M. Bellovin",
  title =        "What a Real Cybersecurity Bill Should Address",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "3",
  pages =        "92--92",
  month =        may # "\slash " # jun,
  year =         "2015",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Aug 3 11:45:33 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2015/03/msp2015030092.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2015/03/msp2015030092-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2015:FCc,
  author =       "Anonymous",
  title =        "Front Cover",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "3",
  pages =        "c1--c1",
  month =        may # "\slash " # jun,
  year =         "2015",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Aug 3 11:45:33 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2015/03/msp20150300c1.pdf",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2015/03/msp20150300c1-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2015:GMLb,
  author =       "Anonymous",
  title =        "Get more, for less! {House} Advertisement",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "3",
  pages =        "c4--c4",
  month =        may # "\slash " # jun,
  year =         "2015",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Aug 3 11:45:33 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2015/03/msp20150300c4.pdf",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2015/03/msp20150300c4-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2015:ISPb,
  author =       "Anonymous",
  title =        "{IEEE Security \& Privacy} House Advertisement",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "3",
  pages =        "c3--c3",
  month =        may # "\slash " # jun,
  year =         "2015",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Aug 3 11:45:33 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2015/03/msp20150300c3.pdf",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2015/03/msp20150300c3-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2015:RSCb,
  author =       "Anonymous",
  title =        "Rock Stars of Cybersecurity House Advertisement",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "3",
  pages =        "c2--c2",
  month =        may # "\slash " # jun,
  year =         "2015",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Aug 3 11:45:33 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2015/03/msp20150300c2.pdf",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2015/03/msp20150300c2-abs.html",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Benzel:2015:SPC,
  author =       "Terry Benzel",
  title =        "A Strategic Plan for Cybersecurity Research and
                 Development",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "4",
  pages =        "3--5",
  month =        jul # "\slash " # aug,
  year =         "2015",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Aug 31 09:54:39 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2015/04/msp2015040003.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2015/04/msp2015040003-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2015:Md,
  author =       "Anonymous",
  title =        "Masthead",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "4",
  pages =        "6--6",
  month =        jul # "\slash " # aug,
  year =         "2015",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Aug 31 09:54:39 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2015/04/msp2015040006.pdf",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2015/04/msp2015040006-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{McGraw:2015:SBTd,
  author =       "Gary McGraw",
  title =        "{Silver Bullet} Talks with {Katie Moussouris}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "4",
  pages =        "7--9",
  month =        jul # "\slash " # aug,
  year =         "2015",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Aug 31 09:54:39 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2015/04/msp2015040007.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2015/04/msp2015040007-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Pfleeger:2015:LOD,
  author =       "Shari Lawrence Pfleeger",
  title =        "Learning from Other Disciplines",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "4",
  pages =        "10--11",
  month =        jul # "\slash " # aug,
  year =         "2015",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Aug 31 09:54:39 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2015/04/msp2015040010.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2015/04/msp2015040010-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anthony:2015:BBI,
  author =       "Denise Anthony and Timothy Stablein and Emily K.
                 Carian",
  title =        "{Big Brother} in the Information Age: Concerns about
                 Government Information Gathering over Time",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "4",
  pages =        "12--19",
  month =        jul # "\slash " # aug,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2015.70",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Aug 31 09:54:39 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2015/04/msp2015040012-abs.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2015/04/msp2015040012-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Steinke:2015:ICI,
  author =       "Julie Steinke and Balca Bolunmez and Laura Fletcher
                 and Vicki Wang and Alan J. Tomassetti and Kristin M.
                 Repchick and Stephen J. Zaccaro and Reeshad S. Dalal
                 and Lois E. Tetrick",
  title =        "Improving Cybersecurity Incident Response Team
                 Effectiveness Using Teams-Based Research",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "4",
  pages =        "20--29",
  month =        jul # "\slash " # aug,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2015.71",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Aug 31 09:54:39 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2015/04/msp2015040020-abs.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2015/04/msp2015040020-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{AlSabbagh:2015:STF,
  author =       "Bilal {Al Sabbagh} and Stewart Kowalski",
  title =        "A Socio-technical Framework for Threat Modeling a
                 Software Supply Chain",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "4",
  pages =        "30--39",
  month =        jul # "\slash " # aug,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2015.72",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Aug 31 09:54:39 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2015/04/msp2015040030-abs.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2015/04/msp2015040030-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Hole:2015:TAF,
  author =       "Kjell Jorgen Hole",
  title =        "Toward Anti-fragility: A Malware-Halting Technique",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "4",
  pages =        "40--46",
  month =        jul # "\slash " # aug,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2015.73",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Aug 31 09:54:39 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2015/04/msp2015040040-abs.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2015/04/msp2015040040-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Dimitrakakis:2015:DBP,
  author =       "Christos Dimitrakakis and Aikaterini Mitrokotsa",
  title =        "Distance-Bounding Protocols: Are You Close Enough?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "4",
  pages =        "47--51",
  month =        jul # "\slash " # aug,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2015.87",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Aug 31 09:54:39 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2015/04/msp2015040047-abs.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2015/04/msp2015040047-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Gugelmann:2015:CCB,
  author =       "David Gugelmann and Pascal Studerus and Vincent
                 Lenders and Bernhard Ager",
  title =        "Can Content-Based Data Loss Prevention Solutions
                 Prevent Data Leakage in {Web} Traffic?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "4",
  pages =        "52--59",
  month =        jul # "\slash " # aug,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2015.88",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Aug 31 09:54:39 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2015/04/msp2015040052-abs.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2015/04/msp2015040052-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Tyagi:2015:PIU,
  author =       "Rohit Tyagi and Tuhin Paul and B. S. Manoj and B.
                 Thanudas",
  title =        "Packet Inspection for Unauthorized {OS} Detection in
                 Enterprises",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "4",
  pages =        "60--65",
  month =        jul # "\slash " # aug,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2015.86",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Aug 31 09:54:39 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2015/04/msp2015040060-abs.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2015/04/msp2015040060-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{DeMott:2015:BE,
  author =       "Jared DeMott",
  title =        "Bypassing {EMET 4.1}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "4",
  pages =        "66--72",
  month =        jul # "\slash " # aug,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2015.75",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Aug 31 09:54:39 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2015/04/msp2015040066-abs.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2015/04/msp2015040066-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Knight:2015:ISC,
  author =       "John Knight",
  title =        "The Importance of Security Cases: Proof Is Good, But
                 Not Enough",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "4",
  pages =        "73--75",
  month =        jul # "\slash " # aug,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2015.68",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Aug 31 09:54:39 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2015/04/msp2015040073-abs.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2015/04/msp2015040073-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Lesk:2015:IAT,
  author =       "Michael Lesk",
  title =        "Ideas Ahead of Their Time: Digital Time Stamping",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "4",
  pages =        "76--79",
  month =        jul # "\slash " # aug,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2015.69",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Aug 31 09:54:39 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2015/04/msp2015040076-abs.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2015/04/msp2015040076-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Margulies:2015:GDO,
  author =       "Jonathan Margulies",
  title =        "Garage Door Openers: An {Internet of Things} Case
                 Study",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "4",
  pages =        "80--83",
  month =        jul # "\slash " # aug,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2015.80",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Aug 31 09:54:39 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2015/04/msp2015040080-abs.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2015/04/msp2015040080-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Whitty:2015:MMF,
  author =       "Monica T. Whitty",
  title =        "Mass-Marketing Fraud: A Growing Concern",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "4",
  pages =        "84--87",
  month =        jul # "\slash " # aug,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2015.85",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Aug 31 09:54:39 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2015/04/msp2015040084-abs.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2015/04/msp2015040084-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Geer:2015:RU,
  author =       "Daniel E. Geer",
  title =        "The Right to Be Unobserved",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "4",
  pages =        "88--88",
  month =        jul # "\slash " # aug,
  year =         "2015",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Aug 31 09:54:39 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2015/04/msp2015040088.html",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2015/04/msp2015040088-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2015:FCd,
  author =       "Anonymous",
  title =        "Front Cover",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "4",
  pages =        "c1--c1",
  month =        jul # "\slash " # aug,
  year =         "2015",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Aug 31 09:54:39 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2015/04/msp20150400c1.pdf",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2015/04/msp20150400c1-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2015:ICSa,
  author =       "Anonymous",
  title =        "{IEEE Computer Society} House Advertisement",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "4",
  pages =        "c3--c3",
  month =        jul # "\slash " # aug,
  year =         "2015",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Aug 31 09:54:39 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2015/04/msp20150400c3.pdf",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2015/04/msp20150400c3-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2015:ISPc,
  author =       "Anonymous",
  title =        "{IEEE Security \& Privacy} House Advertisement",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "4",
  pages =        "c4--c4",
  month =        jul # "\slash " # aug,
  year =         "2015",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Aug 31 09:54:39 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2015/04/msp20150400c4.pdf",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2015/04/msp20150400c4-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2015:RMDa,
  author =       "Anonymous",
  title =        "{2016 Richard E. Merwin Distinguished Service Award}
                 House Advertisement",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "4",
  pages =        "c2--c2",
  month =        jul # "\slash " # aug,
  year =         "2015",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Aug 31 09:54:39 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://www.computer.org/csdl/mags/sp/2015/04/msp20150400c2.pdf",
  abstract-URL = "http://www.computer.org/csdl/mags/sp/2015/04/msp20150400c2-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Bloomfield:2015:ARD,
  author =       "Robin E. Bloomfield",
  title =        "Autonomy, Robotics, and Dependability",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "5",
  pages =        "3--5",
  month =        sep # "\slash " # oct,
  year =         "2015",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Oct 31 11:38:22 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/csdl/mags/sp/2015/05/msp2015050003.html",
  abstract-URL = "http://csdl.computer.org/csdl/mags/sp/2015/05/msp2015050003-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2015:Me,
  author =       "Anonymous",
  title =        "Masthead",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "5",
  pages =        "6--6",
  month =        sep # "\slash " # oct,
  year =         "2015",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Oct 31 11:38:22 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/csdl/mags/sp/2015/05/msp2015050006.pdf",
  abstract-URL = "http://csdl.computer.org/csdl/mags/sp/2015/05/msp2015050006-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2015:FYJc,
  author =       "Anonymous",
  title =        "Focus on Your Job Search House Advertisement",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "5",
  pages =        "7--7",
  month =        sep # "\slash " # oct,
  year =         "2015",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Oct 31 11:38:22 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/csdl/mags/sp/2015/05/msp2015050007.pdf",
  abstract-URL = "http://csdl.computer.org/csdl/mags/sp/2015/05/msp2015050007-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{McGraw:2015:SBTe,
  author =       "Gary McGraw",
  title =        "{Silver Bullet} Talks with {Bart Preneel}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "5",
  pages =        "8--10",
  month =        sep # "\slash " # oct,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2015.101",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Oct 31 11:38:22 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/csdl/mags/sp/2015/05/msp2015050008-abs.html",
  abstract-URL = "http://csdl.computer.org/csdl/mags/sp/2015/05/msp2015050008-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2015:RMDb,
  author =       "Anonymous",
  title =        "{2016 Richard E. Merwin Distinguished Service Award}
                 House Advertisement",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "5",
  pages =        "11--11",
  month =        sep # "\slash " # oct,
  year =         "2015",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Oct 31 11:38:22 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/csdl/mags/sp/2015/05/msp2015050011.pdf",
  abstract-URL = "http://csdl.computer.org/csdl/mags/sp/2015/05/msp2015050011-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Felici:2015:WNE,
  author =       "Massimo Felici and Nick Wainwright and Fabio Bisogni
                 and Simona Cavallini",
  title =        "What's New in the Economics of Cybersecurity?:
                 Observational and Empirical Studies",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "5",
  pages =        "12--15",
  month =        sep # "\slash " # oct,
  year =         "2015",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Oct 31 11:38:22 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/csdl/mags/sp/2015/05/msp2015050012.html",
  abstract-URL = "http://csdl.computer.org/csdl/mags/sp/2015/05/msp2015050012-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Asghari:2015:EFB,
  author =       "Hadi Asghari and Michel J. G. van Eeten and Johannes
                 M. Bauer",
  title =        "Economics of Fighting Botnets: Lessons from a Decade
                 of Mitigation",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "5",
  pages =        "16--23",
  month =        sep # "\slash " # oct,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2015.110",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Oct 31 11:38:22 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/csdl/mags/sp/2015/05/msp2015050016-abs.html",
  abstract-URL = "http://csdl.computer.org/csdl/mags/sp/2015/05/msp2015050016-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Preibusch:2015:VWS,
  author =       "Soren Preibusch",
  title =        "The Value of {Web} Search Privacy",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "5",
  pages =        "24--32",
  month =        sep # "\slash " # oct,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2015.109",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Oct 31 11:38:22 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/csdl/mags/sp/2015/05/msp2015050024-abs.html",
  abstract-URL = "http://csdl.computer.org/csdl/mags/sp/2015/05/msp2015050024-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2015:ICSb,
  author =       "Anonymous",
  title =        "{IEEE Computer Society} 2015 Call for Major Award
                 Nominations House Advertisement",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "5",
  pages =        "33--33",
  month =        sep # "\slash " # oct,
  year =         "2015",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Oct 31 11:38:22 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/csdl/mags/sp/2015/05/msp2015050033.pdf",
  abstract-URL = "http://csdl.computer.org/csdl/mags/sp/2015/05/msp2015050033-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Caulfield:2015:ISP,
  author =       "Tristan Caulfield and David Pym",
  title =        "Improving Security Policy Decisions with Models",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "5",
  pages =        "34--41",
  month =        sep # "\slash " # oct,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2015.97",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Oct 31 11:38:22 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/csdl/mags/sp/2015/05/msp2015050034-abs.html",
  abstract-URL = "http://csdl.computer.org/csdl/mags/sp/2015/05/msp2015050034-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Bruno:2015:APC,
  author =       "Clementina Bruno and Luca Guidi and Azahara
                 Lorite-Espejo and Daniela Pestonesi",
  title =        "Assessing a Potential Cyberattack on the {Italian}
                 Electric System",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "5",
  pages =        "42--51",
  month =        sep # "\slash " # oct,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2015.99",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Oct 31 11:38:22 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/csdl/mags/sp/2015/05/msp2015050042-abs.html",
  abstract-URL = "http://csdl.computer.org/csdl/mags/sp/2015/05/msp2015050042-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{DeGramatica:2015:IIE,
  author =       "Martina {De Gramatica} and Fabio Massacci and Woohyun
                 Shim and Alessandra Tedeschi and Julian Williams",
  title =        "{IT} Interdependence and the Economic Fairness of
                 Cybersecurity Regulations for Civil Aviation",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "5",
  pages =        "52--61",
  month =        sep # "\slash " # oct,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2015.98",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Oct 31 11:38:22 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/csdl/mags/sp/2015/05/msp2015050052-abs.html",
  abstract-URL = "http://csdl.computer.org/csdl/mags/sp/2015/05/msp2015050052-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2015:CSA,
  author =       "Anonymous",
  title =        "Call for Standards Award Nominations House
                 Advertisement",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "5",
  pages =        "62--62",
  month =        sep # "\slash " # oct,
  year =         "2015",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Oct 31 11:38:22 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/csdl/mags/sp/2015/05/msp2015050062.pdf",
  abstract-URL = "http://csdl.computer.org/csdl/mags/sp/2015/05/msp2015050062-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Akhtar:2015:BLD,
  author =       "Zahid Akhtar and Christian Micheloni and Gian Luca
                 Foresti",
  title =        "Biometric Liveness Detection: Challenges and Research
                 Opportunities",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "5",
  pages =        "63--72",
  month =        sep # "\slash " # oct,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2015.116",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Oct 31 11:38:22 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/csdl/mags/sp/2015/05/msp2015050063-abs.html",
  abstract-URL = "http://csdl.computer.org/csdl/mags/sp/2015/05/msp2015050063-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2015:CNH,
  author =       "Anonymous",
  title =        "Call for Nominees House Advertisement",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "5",
  pages =        "73--73",
  month =        sep # "\slash " # oct,
  year =         "2015",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Oct 31 11:38:22 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/csdl/mags/sp/2015/05/msp2015050073.pdf",
  abstract-URL = "http://csdl.computer.org/csdl/mags/sp/2015/05/msp2015050073-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Bashir:2015:CCH,
  author =       "Masooda Bashir and April Lambert and Boyi Guo and
                 Nasir Memon and Tzipora Halevi",
  title =        "Cybersecurity Competitions: The Human Angle",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "5",
  pages =        "74--79",
  month =        sep # "\slash " # oct,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2015.100",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Oct 31 11:38:22 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/csdl/mags/sp/2015/05/msp2015050074-abs.html",
  abstract-URL = "http://csdl.computer.org/csdl/mags/sp/2015/05/msp2015050074-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Evans:2015:VHR,
  author =       "Katrine Evans",
  title =        "{Vidal--Hall} and Risk Management for Privacy
                 Breaches",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "5",
  pages =        "80--84",
  month =        sep # "\slash " # oct,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2015.94",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Oct 31 11:38:22 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/csdl/mags/sp/2015/05/msp2015050080-abs.html",
  abstract-URL = "http://csdl.computer.org/csdl/mags/sp/2015/05/msp2015050080-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2015:SES,
  author =       "Anonymous",
  title =        "Software Experts Summit House Advertisement",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "5",
  pages =        "85--85",
  month =        sep # "\slash " # oct,
  year =         "2015",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Oct 31 11:38:22 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/csdl/mags/sp/2015/05/msp2015050085.pdf",
  abstract-URL = "http://csdl.computer.org/csdl/mags/sp/2015/05/msp2015050085-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Barthe:2015:HAC,
  author =       "Gilles Barthe",
  title =        "High-Assurance Cryptography: Cryptographic Software We
                 Can Trust",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "5",
  pages =        "86--89",
  month =        sep # "\slash " # oct,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2015.112",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Oct 31 11:38:22 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/csdl/mags/sp/2015/05/msp2015050086-abs.html",
  abstract-URL = "http://csdl.computer.org/csdl/mags/sp/2015/05/msp2015050086-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Kwon:2015:PPD,
  author =       "Juhee Kwon and M. Eric Johnson",
  title =        "Protecting Patient Data --- The Economic Perspective
                 of Healthcare Security",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "5",
  pages =        "90--95",
  month =        sep # "\slash " # oct,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2015.113",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Oct 31 11:38:22 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/csdl/mags/sp/2015/05/msp2015050090-abs.html",
  abstract-URL = "http://csdl.computer.org/csdl/mags/sp/2015/05/msp2015050090-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Margulies:2015:SCB,
  author =       "Jonathan Margulies",
  title =        "Securing Cloud-Based Applications, {Part 1}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "5",
  pages =        "96--98",
  month =        sep # "\slash " # oct,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2015.117",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Oct 31 11:38:22 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/csdl/mags/sp/2015/05/msp2015050096-abs.html",
  abstract-URL = "http://csdl.computer.org/csdl/mags/sp/2015/05/msp2015050096-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Modic:2015:ACE,
  author =       "David Modic and Ross Anderson",
  title =        "{It}'s All Over but the Crying: The Emotional and
                 Financial Impact of {Internet} Fraud",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "5",
  pages =        "99--103",
  month =        sep # "\slash " # oct,
  year =         "2015",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2015.107",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Oct 31 11:38:22 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/csdl/mags/sp/2015/05/msp2015050099-abs.html",
  abstract-URL = "http://csdl.computer.org/csdl/mags/sp/2015/05/msp2015050099-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Geer:2015:CM,
  author =       "Daniel E. Geer",
  title =        "Children of the Magenta",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "5",
  pages =        "104--104",
  month =        sep # "\slash " # oct,
  year =         "2015",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Oct 31 11:38:22 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/csdl/mags/sp/2015/05/msp2015050104.html",
  abstract-URL = "http://csdl.computer.org/csdl/mags/sp/2015/05/msp2015050104-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2015:FCe,
  author =       "Anonymous",
  title =        "Front Cover",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "5",
  pages =        "c1--c1",
  month =        sep # "\slash " # oct,
  year =         "2015",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Oct 31 11:38:22 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/csdl/mags/sp/2015/05/msp20150500c1.pdf",
  abstract-URL = "http://csdl.computer.org/csdl/mags/sp/2015/05/msp20150500c1-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2015:ISPd,
  author =       "Anonymous",
  title =        "{IEEE Security \& Privacy} House Advertisement",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "5",
  pages =        "c4--c4",
  month =        sep # "\slash " # oct,
  year =         "2015",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Oct 31 11:38:22 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/csdl/mags/sp/2015/05/msp20150500c4.pdf",
  abstract-URL = "http://csdl.computer.org/csdl/mags/sp/2015/05/msp20150500c4-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2015:KYC,
  author =       "Anonymous",
  title =        "Keep Your Career Moving Forward House Advertisement",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "5",
  pages =        "c3--c3",
  month =        sep # "\slash " # oct,
  year =         "2015",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Oct 31 11:38:22 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/csdl/mags/sp/2015/05/msp20150500c3.pdf",
  abstract-URL = "http://csdl.computer.org/csdl/mags/sp/2015/05/msp20150500c3-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2015:RSCc,
  author =       "Anonymous",
  title =        "Rock Stars of Cybersecurity House Advertisement",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "5",
  pages =        "c2--c2",
  month =        sep # "\slash " # oct,
  year =         "2015",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Oct 31 11:38:22 MDT 2015",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "http://csdl.computer.org/csdl/mags/sp/2015/05/msp20150500c2.pdf",
  abstract-URL = "http://csdl.computer.org/csdl/mags/sp/2015/05/msp20150500c2-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2015:TC,
  author =       "Anonymous",
  title =        "Table of Contents",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "6",
  pages =        "1--2",
  month =        nov # "\slash " # dec,
  year =         "2015",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Feb 9 07:27:28 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Pfleeger:2015:SMH,
  author =       "S. L. Pfleeger",
  title =        "{Spider-Man}, Hubris, and the Future of Security and
                 Privacy",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "6",
  pages =        "3--10",
  month =        nov # "\slash " # dec,
  year =         "2015",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Feb 9 07:27:28 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2015:Mf,
  author =       "Anonymous",
  title =        "Masthead",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "6",
  pages =        "11",
  month =        nov # "\slash " # dec,
  year =         "2015",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Feb 9 07:27:28 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{McGraw:2015:SBTf,
  author =       "Gary McGraw",
  title =        "{Silver Bullet} Talks with {Steven M. Bellovin} and
                 {Matthew Green}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "6",
  pages =        "12--15",
  month =        nov # "\slash " # dec,
  year =         "2015",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Feb 9 07:27:28 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Pfleeger:2015:LLO,
  author =       "Shari Lawrence Pfleeger",
  title =        "Lessons Learned by Our Editorial Board",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "6",
  pages =        "16--17",
  month =        nov # "\slash " # dec,
  year =         "2015",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Feb 9 07:27:28 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Oppliger:2015:QRA,
  author =       "R. Oppliger",
  title =        "Quantitative Risk Analysis in Information Security
                 Management: A Modern Fairy Tale",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "6",
  pages =        "18--21",
  month =        nov # "\slash " # dec,
  year =         "2015",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Feb 9 07:27:28 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Pfleeger:2015:LLS,
  author =       "C. P. Pfleeger",
  title =        "Lesson Learned: Security is Inevitable",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "6",
  pages =        "22--28",
  month =        nov # "\slash " # dec,
  year =         "2015",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Feb 9 07:27:28 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2015:GRY,
  author =       "Anonymous",
  title =        "Get the Recognition You Deserve House Advertisement",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "6",
  pages =        "29",
  month =        nov # "\slash " # dec,
  year =         "2015",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Feb 9 07:27:28 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Bellandi:2015:TEA,
  author =       "V. Bellandi and S. Cimato and E. Damiani and G.
                 Gianini and A. Zilli",
  title =        "Toward Economic-Aware Risk Assessment on the Cloud",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "6",
  pages =        "30--37",
  month =        nov # "\slash " # dec,
  year =         "2015",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Feb 9 07:27:28 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Meland:2015:MRC,
  author =       "P. H. Meland and I. A. Tondel and B. Solhaug",
  title =        "Mitigating Risk with Cyberinsurance",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "6",
  pages =        "38--43",
  month =        nov # "\slash " # dec,
  year =         "2015",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Feb 9 07:27:28 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Avgerou:2015:PAD,
  author =       "A. D. Avgerou and Y. C. Stamatiou",
  title =        "Privacy Awareness Diffusion in Social Networks",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "6",
  pages =        "44--50",
  month =        nov # "\slash " # dec,
  year =         "2015",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Feb 9 07:27:28 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2015:CPH,
  author =       "Anonymous",
  title =        "Call for Papers House Advertisement",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "6",
  pages =        "51",
  month =        nov # "\slash " # dec,
  year =         "2015",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Feb 9 07:27:28 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Ryoo:2015:AAS,
  author =       "Jungwoo Ryoo and R. Kazman and P. Anand",
  title =        "Architectural Analysis for Security",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "6",
  pages =        "52--59",
  month =        nov # "\slash " # dec,
  year =         "2015",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Feb 9 07:27:28 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Verma:2015:SAE,
  author =       "R. Verma and M. Kantarcioglu and D. Marchette and E.
                 Leiss and T. Solorio",
  title =        "Security Analytics: Essential Data Analytics Knowledge
                 for Cybersecurity Professionals and Students",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "6",
  pages =        "60--65",
  month =        nov # "\slash " # dec,
  year =         "2015",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Feb 9 07:27:28 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Kosseff:2015:NLF,
  author =       "J. Kosseff",
  title =        "A New Legal Framework for Online Anonymity:
                 {California}'s Privacy-Based Approach",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "6",
  pages =        "66--70",
  month =        nov # "\slash " # dec,
  year =         "2015",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Feb 9 07:27:28 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2015:WWL,
  author =       "Anonymous",
  title =        "Watch the World's Leading Experts Take Multi-Core
                 Strategies to New Heights House Advertisement",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "6",
  pages =        "71",
  month =        nov # "\slash " # dec,
  year =         "2015",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Feb 9 07:27:28 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Song:2015:DCG,
  author =       "Jia Song and J. Alves-Foss",
  title =        "The {DARPA Cyber Grand Challenge}: A Competitor's
                 Perspective",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "6",
  pages =        "72--76",
  month =        nov # "\slash " # dec,
  year =         "2015",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Feb 9 07:27:28 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Memon:2015:CAT,
  author =       "A. M. Memon and A. Anwar",
  title =        "Colluding Apps: Tomorrow's Mobile Malware Threat",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "6",
  pages =        "77--81",
  month =        nov # "\slash " # dec,
  year =         "2015",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Feb 9 07:27:28 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Thimbleby:2015:HD,
  author =       "H. Thimbleby and R. Koppel",
  title =        "The Healthtech Declaration",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "6",
  pages =        "82--84",
  month =        nov # "\slash " # dec,
  year =         "2015",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Feb 9 07:27:28 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Lesk:2015:LC,
  author =       "M. Lesk",
  title =        "License Creep",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "6",
  pages =        "85--88",
  month =        nov # "\slash " # dec,
  year =         "2015",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Feb 9 07:27:28 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Adams:2015:PMD,
  author =       "A. A. Adams",
  title =        "Possessing Mobile Devices",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "6",
  pages =        "89--95",
  month =        nov # "\slash " # dec,
  year =         "2015",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Feb 9 07:27:28 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Bellovin:2015:KK,
  author =       "Steven M. Bellovin",
  title =        "The Key to the Key",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "6",
  pages =        "96",
  month =        nov # "\slash " # dec,
  year =         "2015",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Feb 9 07:27:28 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2015:FCf,
  author =       "Anonymous",
  title =        "Front Cover",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "6",
  pages =        "c1",
  month =        nov # "\slash " # dec,
  year =         "2015",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Feb 9 07:27:28 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2015:FYJd,
  author =       "Anonymous",
  title =        "Focus on Your Job Search House Advertisement",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "6",
  pages =        "c3",
  month =        nov # "\slash " # dec,
  year =         "2015",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Feb 9 07:27:28 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2015:ICSc,
  author =       "Anonymous",
  title =        "{IEEE Computer Society}: Be at the Center of It All
                 House Advertisement",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "6",
  pages =        "c2",
  month =        nov # "\slash " # dec,
  year =         "2015",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Feb 9 07:27:28 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2015:S,
  author =       "Anonymous",
  title =        "Sponsor",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "6",
  pages =        "??--??",
  month =        nov # "\slash " # dec,
  year =         "2015",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Feb 9 07:27:28 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Editor-in-Chief:2015:ISP,
  author =       "Editor-in-Chief",
  title =        "{IEEE Security \& Privacy} House Advertisement",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "13",
  number =       "6",
  pages =        "c4",
  month =        nov # "\slash " # dec,
  year =         "2015",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Feb 9 07:27:28 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2016:TCa,
  author =       "Anonymous",
  title =        "Table of Contents",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "1",
  pages =        "1--2",
  month =        jan # "\slash " # feb,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Jun 8 08:40:32 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security {\&} Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Sadeghi:2016:GFW,
  author =       "Ahmad-Reza Sadeghi",
  title =        "Games without Frontiers: Whither Information Security
                 and Privacy?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "1",
  pages =        "3--5",
  month =        jan # "\slash " # feb,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Jun 8 08:40:32 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security {\&} Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2016:Ma,
  author =       "Anonymous",
  title =        "Masthead",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "1",
  pages =        "6--6",
  month =        jan # "\slash " # feb,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Jun 8 08:40:32 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security {\&} Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{McGraw:2016:SBTa,
  author =       "Gary McGraw",
  title =        "{Silver Bullet} Talks with {Peiter (Mudge) Zatko}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "1",
  pages =        "7--10",
  month =        jan # "\slash " # feb,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Jun 8 08:40:32 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security {\&} Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Pfleeger:2016:SEG,
  author =       "Shari Lawrence Pfleeger",
  title =        "Software Everywhere [{Guest editors}' introduction]",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "1",
  pages =        "11--11",
  month =        jan # "\slash " # feb,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Jun 8 08:40:32 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security {\&} Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Ressler:2016:MFV,
  author =       "Eugene K. Ressler",
  title =        "Mettle Fatigue: {VW}'s Single-Point-of-Failure
                 Ethics",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "1",
  pages =        "12--30",
  month =        jan # "\slash " # feb,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2016.6",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Jun 8 08:40:32 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security {\&} Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Pfleeger:2016:LST,
  author =       "Charles P. Pfleeger",
  title =        "Looking into Software Transparency",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "1",
  pages =        "31--36",
  month =        jan # "\slash " # feb,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2016.5",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Jun 8 08:40:32 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security {\&} Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Kuhn:2016:LIT,
  author =       "Richard Kuhn",
  title =        "Learning {Internet-of-Things} Security
                 {``Hands-On''}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "1",
  pages =        "37--46",
  month =        jan # "\slash " # feb,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2016.4",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Jun 8 08:40:32 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security {\&} Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Reed:2016:CJT,
  author =       "Jeffrey H. Reed",
  title =        "A communications jamming taxonomy",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "1",
  pages =        "47--54",
  month =        jan # "\slash " # feb,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2016.13",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Jun 8 08:40:32 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security {\&} Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Babaguchi:2016:EPC,
  author =       "Noboru Babaguchi",
  title =        "Evaluating Protection Capability for Visual Privacy
                 Information",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "1",
  pages =        "55--61",
  month =        jan # "\slash " # feb,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2016.3",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Jun 8 08:40:32 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security {\&} Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2016:SIR,
  author =       "Anonymous",
  title =        "Special Issue on Real-World Cryptography Call for
                 Papers House Advertisement",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "1",
  pages =        "62",
  month =        jan # "\slash " # feb,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Jun 8 08:40:32 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security {\&} Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Naccache:2016:FHE,
  author =       "David Naccache",
  title =        "Fully Homomorphic Encryption: Computations with a
                 Blindfold",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "1",
  pages =        "63--67",
  month =        jan # "\slash " # feb,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2016.8",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Jun 8 08:40:32 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security {\&} Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Bos:2016:BRA,
  author =       "Herbert Bos",
  title =        "Binary Rejuvenation: Applications and Challenges",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "1",
  pages =        "68--71",
  month =        jan # "\slash " # feb,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2016.20",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Jun 8 08:40:32 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security {\&} Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Amo:2016:AGG,
  author =       "Laura Amo",
  title =        "Addressing Gender Gaps in Teens' Cybersecurity
                 Engagement and Self-Efficacy",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "1",
  pages =        "72--75",
  month =        jan # "\slash " # feb,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2016.12",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Jun 8 08:40:32 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security {\&} Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Alves-Foss:2016:DCG,
  author =       "Jim Alves-Foss",
  title =        "The {DARPA Cyber Grand Challenge}: A Competitor's
                 Perspective, Part 2",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "1",
  pages =        "76--81",
  month =        jan # "\slash " # feb,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2016.14",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Jun 8 08:40:32 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security {\&} Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Williams:2016:AIT,
  author =       "Julian Williams",
  title =        "Action, Inaction, Trust, and {Cybersecurity}'s Common
                 Property Problem",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "1",
  pages =        "82--86",
  month =        jan # "\slash " # feb,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2016.2",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Jun 8 08:40:32 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security {\&} Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Schneier:2016:CHT,
  author =       "Bruce Schneier",
  title =        "Cryptography Is Harder than It Looks",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "1",
  pages =        "87--88",
  month =        jan # "\slash " # feb,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Jun 8 08:40:32 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security {\&} Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2016:ABS,
  author =       "Anonymous",
  title =        "4th Annual Best Scientific Cybersecurity Paper
                 Competition",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "1",
  pages =        "c4--c4",
  month =        jan # "\slash " # feb,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Jun 8 08:40:32 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security {\&} Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2016:FCa,
  author =       "Anonymous",
  title =        "Front Cover",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "1",
  pages =        "c1--c1",
  month =        jan # "\slash " # feb,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Jun 8 08:40:32 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security {\&} Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2016:ICSa,
  author =       "Anonymous",
  title =        "{IEEE Computer Society}: Be at the Center of It All
                 House Advertisement",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "1",
  pages =        "c3--c3",
  month =        jan # "\slash " # feb,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Jun 8 08:40:32 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security {\&} Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2016:ISPa,
  author =       "Anonymous",
  title =        "{IEEE Security \& Privacy} Qmags Subscription House
                 Advertisement",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "1",
  pages =        "c2--c2",
  month =        jan # "\slash " # feb,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Jun 8 08:40:32 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security {\&} Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2016:TCb,
  author =       "Anonymous",
  title =        "Table of Contents",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "2",
  pages =        "1--2",
  month =        mar # "\slash " # apr,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Jun 8 08:40:32 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security {\&} Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Epstein:2016:RNP,
  author =       "Jeremy Epstein",
  title =        "Reflections of an {NSF Program Officer}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "2",
  pages =        "3--6",
  month =        mar # "\slash " # apr,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Jun 8 08:40:32 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security {\&} Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2016:Mb,
  author =       "Anonymous",
  title =        "Masthead",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "2",
  pages =        "7--7",
  month =        mar # "\slash " # apr,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Jun 8 08:40:32 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security {\&} Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{McGraw:2016:SBTb,
  author =       "Gary McGraw",
  title =        "{Silver Bullet} Talks with {Jamie Butler}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "2",
  pages =        "8--10",
  month =        mar # "\slash " # apr,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Jun 8 08:40:32 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security {\&} Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2016:CN,
  author =       "Anonymous",
  title =        "Call for nominees",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "2",
  pages =        "11--11",
  month =        mar # "\slash " # apr,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Jun 8 08:40:32 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security {\&} Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Benzel:2016:ISP,
  author =       "Terry Benzel",
  title =        "The {IEEE Security and Privacy} Symposium Workshops",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "2",
  pages =        "12--14",
  month =        mar # "\slash " # apr,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Jun 8 08:40:32 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security {\&} Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Boyce:2016:BOT,
  author =       "Griffin Boyce",
  title =        "Bake in {\tt {.onion}} for Tear-Free and Stronger
                 {Website} Authentication",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "2",
  pages =        "15--21",
  month =        mar # "\slash " # apr,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2016.33",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Jun 8 08:40:32 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security {\&} Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Boneh:2016:SDA,
  author =       "Dan Boneh",
  title =        "{Stickler}: Defending against Malicious Content
                 Distribution Networks in an Unmodified Browser",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "2",
  pages =        "22--28",
  month =        mar # "\slash " # apr,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2016.32",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Jun 8 08:40:32 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security {\&} Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2016:RSR,
  author =       "Anonymous",
  title =        "Rock Stars of Risk-Based Security House
                 Advertisement",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "2",
  pages =        "29",
  month =        mar # "\slash " # apr,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Jun 8 08:40:32 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security {\&} Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Puzanov:2016:AMN,
  author =       "Anton Puzanov",
  title =        "Analysis and Mitigation of {NoSQL} Injections",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "2",
  pages =        "30--39",
  month =        mar # "\slash " # apr,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2016.36",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Jun 8 08:40:32 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security {\&} Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{delAlamo:2016:PES,
  author =       "Jose M. del Alamo",
  title =        "Privacy Engineering: Shaping an Emerging Field of
                 Research and Practice",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "2",
  pages =        "40--46",
  month =        mar # "\slash " # apr,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2016.37",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Jun 8 08:40:32 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security {\&} Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2016:ICSb,
  author =       "Anonymous",
  title =        "{IEEE Computer Society} 2016 Call for Major Award
                 Nominations House Advertisement",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "2",
  pages =        "47--47",
  month =        mar # "\slash " # apr,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Jun 8 08:40:32 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security {\&} Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Dressler:2016:CWS,
  author =       "Falko Dressler",
  title =        "Cleaning up {Web 2.0}'s Security Mess --- at Least
                 Partly",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "2",
  pages =        "48--57",
  month =        mar # "\slash " # apr,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2016.31",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Jun 8 08:40:32 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security {\&} Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Hoofnagle:2016:AFT,
  author =       "Chris Jay Hoofnagle",
  title =        "Assessing the {Federal} Trade {Commission}'s Privacy
                 Assessments",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "2",
  pages =        "58--64",
  month =        mar # "\slash " # apr,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2016.25",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Jun 8 08:40:32 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security {\&} Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2016:CPSa,
  author =       "Anonymous",
  title =        "Call for Papers Special Issue on Genome Privacy and
                 Security House Advertisement",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "2",
  pages =        "65--65",
  month =        mar # "\slash " # apr,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Jun 8 08:40:32 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security {\&} Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Sunyaev:2016:DCC,
  author =       "Ali Sunyaev",
  title =        "Dynamic Certification of Cloud Services: Trust, but
                 Verify!",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "2",
  pages =        "66--71",
  month =        mar # "\slash " # apr,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2016.26",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Jun 8 08:40:32 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security {\&} Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2016:ICSc,
  author =       "Anonymous",
  title =        "{IEEE Computer Society} {Richard E. Merwin Student
                 Leadership Scholarship} House Advertisement",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "2",
  pages =        "72--72",
  month =        mar # "\slash " # apr,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Jun 8 08:40:32 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security {\&} Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Zatko:2016:RRS,
  author =       "Sarah Zatko",
  title =        "Rethinking the Role of Security in Undergraduate
                 Education",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "2",
  pages =        "73--78",
  month =        mar # "\slash " # apr,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2016.40",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Jun 8 08:40:32 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security {\&} Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Scott-Railton:2016:SHR,
  author =       "John Scott-Railton",
  title =        "Security for the High-Risk User: Separate and
                 Unequal",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "2",
  pages =        "79--87",
  month =        mar # "\slash " # apr,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2016.22",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Jun 8 08:40:32 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security {\&} Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Geer:2016:P,
  author =       "Daniel E. Geer",
  title =        "Provenance",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "2",
  pages =        "88--88",
  month =        mar # "\slash " # apr,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Jun 8 08:40:32 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security {\&} Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2016:FCb,
  author =       "Anonymous",
  title =        "Front Cover",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "2",
  pages =        "c1--c1",
  month =        mar # "\slash " # apr,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Jun 8 08:40:32 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security {\&} Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2016:GFHa,
  author =       "Anonymous",
  title =        "Got flaws? {House} Advertisement",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "2",
  pages =        "c2--c2",
  month =        mar # "\slash " # apr,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Jun 8 08:40:32 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security {\&} Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2016:ICSd,
  author =       "Anonymous",
  title =        "{IEEE Computer Society}: Be at the Center of It All
                 House Advertisement",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "2",
  pages =        "c3--c3",
  month =        mar # "\slash " # apr,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Jun 8 08:40:32 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security {\&} Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2016:ISPb,
  author =       "Anonymous",
  title =        "{IEEE Security \& Privacy} House Advertisement",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "2",
  pages =        "c4--c4",
  month =        mar # "\slash " # apr,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Jun 8 08:40:32 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security {\&} Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2016:TCc,
  author =       "Anonymous",
  title =        "Table of Contents",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "3",
  pages =        "1--2",
  month =        may # "\slash " # jun,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Jun 8 08:40:32 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security {\&} Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Horne:2016:TMT,
  author =       "Bill Horne",
  title =        "Trust Me. Trust Me Not",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "3",
  pages =        "3--5",
  month =        may # "\slash " # jun,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Jun 8 08:40:32 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security {\&} Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2016:Mc,
  author =       "Anonymous",
  title =        "Masthead",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "3",
  pages =        "6--6",
  month =        may # "\slash " # jun,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Jun 8 08:40:32 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security {\&} Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{McGraw:2016:SBTc,
  author =       "Gary McGraw",
  title =        "{Silver Bullet} Talks with {Jacob West}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "3",
  pages =        "7--10",
  month =        may # "\slash " # jun,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Jun 8 08:40:32 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security {\&} Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Bisogni:2016:WNE,
  author =       "Fabio Bisogni",
  title =        "What's New in the Economics of Cybersecurity?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "3",
  pages =        "11--13",
  month =        may # "\slash " # jun,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Jun 8 08:40:32 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security {\&} Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Verbij:2016:NMS,
  author =       "Ruud Verbij",
  title =        "The Navigation Metaphor in Security Economics",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "3",
  pages =        "14--21",
  month =        may # "\slash " # jun,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2016.47",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Jun 8 08:40:32 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security {\&} Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Grumbach:2016:CDI,
  author =       "Stephane Grumbach",
  title =        "Chasing Data in the Intermediation Era: Economy and
                 Security at Stake",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "3",
  pages =        "22--31",
  month =        may # "\slash " # jun,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2016.50",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Jun 8 08:40:32 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security {\&} Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Hu:2016:MSA,
  author =       "Hongxin Hu",
  title =        "Mules, Seals, and Attacking Tools: Analyzing 12 Online
                 Marketplaces",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "3",
  pages =        "32--43",
  month =        may # "\slash " # jun,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2016.46",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Jun 8 08:40:32 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security {\&} Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Yannakogeorgos:2016:DCD,
  author =       "Panayotis A. Yannakogeorgos",
  title =        "Designing Cybersecurity into Defense Systems: An
                 Information Economics Approach",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "3",
  pages =        "44--51",
  month =        may # "\slash " # jun,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2016.49",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Jun 8 08:40:32 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security {\&} Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Williams:2016:EIR,
  author =       "Julian Williams",
  title =        "Economic Impacts of Rules- versus Risk-Based
                 Cybersecurity Regulations for Critical Infrastructure
                 Providers",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "3",
  pages =        "52--60",
  month =        may # "\slash " # jun,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2016.48",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Jun 8 08:40:32 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security {\&} Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Waidner:2016:HSP,
  author =       "Michael Waidner",
  title =        "{HbbTV} Security and Privacy: Issues and Challenges",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "3",
  pages =        "61--67",
  month =        may # "\slash " # jun,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2016.54",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Jun 8 08:40:32 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security {\&} Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Celik:2016:MLA,
  author =       "Z. Berkay Celik",
  title =        "Machine Learning in Adversarial Settings",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "3",
  pages =        "68--72",
  month =        may # "\slash " # jun,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2016.51",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Jun 8 08:40:32 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security {\&} Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Suri:2016:QTC,
  author =       "Neeraj Suri",
  title =        "Quantifiably Trusting the Cloud: Putting Metrics to
                 Work",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "3",
  pages =        "73--77",
  month =        may # "\slash " # jun,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2016.65",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Jun 8 08:40:32 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security {\&} Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Lawrence:2016:SDB,
  author =       "Darren Lawrence",
  title =        "Security Dialogues: Building Better Relationships
                 between Security and Business",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "3",
  pages =        "82--87",
  month =        may # "\slash " # jun,
  year =         "2016",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2016.57",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Jun 8 08:40:32 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security {\&} Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Bellovin:2016:AS,
  author =       "Steven M. Bellovin",
  title =        "Attack Surfaces",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "3",
  pages =        "88--88",
  month =        may # "\slash " # jun,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Jun 8 08:40:32 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security {\&} Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2016:CPSb,
  author =       "Anonymous",
  title =        "Call for Papers Special Issue on Electronic Voting
                 House Advertisement",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "3",
  pages =        "c3--c3",
  month =        may # "\slash " # jun,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Jun 8 08:40:32 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security {\&} Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2016:FCc,
  author =       "Anonymous",
  title =        "Front Cover",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "3",
  pages =        "c1--c1",
  month =        may # "\slash " # jun,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Jun 8 08:40:32 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security {\&} Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2016:GFHb,
  author =       "Anonymous",
  title =        "Got flaws? {House} Advertisement",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "3",
  pages =        "c2--c2",
  month =        may # "\slash " # jun,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Jun 8 08:40:32 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security {\&} Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2016:ISPc,
  author =       "Anonymous",
  title =        "{IEEE Security \& Privacy} House Advertisement",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "3",
  pages =        "c4--c4",
  month =        may # "\slash " # jun,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Jun 8 08:40:32 MDT 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security {\&} Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2016:TCd,
  author =       "Anonymous",
  title =        "Table of Contents",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "4",
  pages =        "1--2",
  month =        jul # "\slash " # aug,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 08:21:28 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2016/04/msp2016040001.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Benzel:2016:GCC,
  author =       "Terry Benzel",
  title =        "The Growth of a Conference, a Community, and an
                 Industry",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "4",
  pages =        "3--5",
  month =        jul # "\slash " # aug,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 08:21:28 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2016/04/msp2016040003.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2016:Md,
  author =       "Anonymous",
  title =        "Masthead",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "4",
  pages =        "6",
  month =        jul # "\slash " # aug,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 08:21:28 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2016/04/msp2016040006.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{McGraw:2016:SBTd,
  author =       "Gary McGraw",
  title =        "{Silver Bullet} Talks with {Martin Hellman}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "4",
  pages =        "7--11",
  month =        jul # "\slash " # aug,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 08:21:28 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2016/04/msp2016040007.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Li:2016:PSP,
  author =       "Qing-Yun Li and Lei Zhang",
  title =        "The Public Security and Personal Privacy Survey:
                 Biometric Technology in {Hong Kong}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "4",
  pages =        "12--21",
  month =        jul # "\slash " # aug,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 08:21:28 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2016/04/msp2016040012-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Laakkonen:2016:IPD,
  author =       "Jussi Laakkonen and Janne Parkkila and Pekka Jappinen
                 and Jouni Ikonen and Ahmed Seffah",
  title =        "Incorporating Privacy into Digital Game Platform
                 Design: The What, Why, and How",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "4",
  pages =        "22--32",
  month =        jul # "\slash " # aug,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 08:21:28 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2016/04/msp2016040022-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2016:ICSe,
  author =       "Anonymous",
  title =        "{IEEE Computer Society}: Be at the Center of It All
                 House Advertisement",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "4",
  pages =        "33",
  month =        jul # "\slash " # aug,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 08:21:28 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2016/04/msp2016040033.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Liyanage:2016:OCS,
  author =       "Madhusanka Liyanage and Ahmed Bux Abro and Mika
                 Ylianttila and Andrei Gurtov",
  title =        "Opportunities and Challenges of Software-Defined
                 Mobile Networks in Network Security",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "4",
  pages =        "34--44",
  month =        jul # "\slash " # aug,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 08:21:28 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2016/04/msp2016040034-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2016:CPSc,
  author =       "Anonymous",
  title =        "Call for Papers Special Issue on Electronic Voting",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "4",
  pages =        "45",
  month =        jul # "\slash " # aug,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 08:21:28 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2016/04/msp2016040045.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Sood:2016:TDG,
  author =       "Aditya K. Sood and Sherali Zeadally",
  title =        "A Taxonomy of Domain-Generation Algorithms",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "4",
  pages =        "46--53",
  month =        jul # "\slash " # aug,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 08:21:28 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2016/04/msp2016040046-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Ortiz-Yepes:2016:RTA,
  author =       "Diego A. Ortiz-Yepes",
  title =        "A Review of Technical Approaches to Realizing
                 Near-Field Communication Mobile Payments",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "4",
  pages =        "54--62",
  month =        jul # "\slash " # aug,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 08:21:28 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2016/04/msp2016040054-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2016:CPSd,
  author =       "Anonymous",
  title =        "Call for Papers Special Issue on Postquantum
                 Cryptography",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "4",
  pages =        "63",
  month =        jul # "\slash " # aug,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 08:21:28 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2016/04/msp2016040063.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Burton:2016:VVE,
  author =       "Craig Burton and Chris Culnane and Steve Schneider",
  title =        "{vVote}: Verifiable Electronic Voting in Practice",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "4",
  pages =        "64--73",
  month =        jul # "\slash " # aug,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 08:21:28 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2016/04/msp2016040064-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Yang:2016:TCP,
  author =       "Baijian Justin Yang and Brian Kirk",
  title =        "{Try-CybSI}: A Platform for Trying Out Cybersecurity",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "4",
  pages =        "74--75",
  month =        jul # "\slash " # aug,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 08:21:28 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2016/04/msp2016040074-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Mailloux:2016:PSS,
  author =       "Logan O. Mailloux and Michael A. McEvilley and Stephen
                 Khou and John M. Pecarina",
  title =        "Putting the {`Systems'} in Security Engineering: An
                 Examination of {NIST Special Publication 800-160}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "4",
  pages =        "76--80",
  month =        jul # "\slash " # aug,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 08:21:28 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2016/04/msp2016040076-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "National Institute of Standards and Technology (NIST)
                 Special Publication 800-160 Systems Security
                 Engineering: Considerations for a Multidisciplinary
                 Approach in the Engineering of Trustworthy Secure
                 Systems",
}

@Article{Anonymous:2016:ICSf,
  author =       "Anonymous",
  title =        "{IEEE Computer Society} 2016 Call for Major Award
                 Nominations House Advertisement",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "4",
  pages =        "81",
  month =        jul # "\slash " # aug,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 08:21:28 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2016/04/msp2016040081.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Cunningham:2016:ISP,
  author =       "Robert Cunningham and Pamela Gupta and Ulf Lindqvist
                 and Stelios Sidiroglou-Douskos and Michael Hicks",
  title =        "{IEEE SecDev 2016}: Prioritizing Secure Development",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "4",
  pages =        "82--84",
  month =        jul # "\slash " # aug,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 08:21:28 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2016/04/msp2016040082.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2016:CEA,
  author =       "Anonymous",
  title =        "Computer Entrepreneur Award House Advertisement",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "4",
  pages =        "85",
  month =        jul # "\slash " # aug,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 08:21:28 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2016/04/msp2016040085.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2016:CNE,
  author =       "Anonymous",
  title =        "Call for Nominees Education Awards Nominations House
                 Advertisement",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "4",
  pages =        "86",
  month =        jul # "\slash " # aug,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 08:21:28 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2016/04/msp2016040086.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Geer:2016:PP,
  author =       "Daniel E. Geer",
  title =        "Privacy's Paradigm",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "4",
  pages =        "87--88",
  month =        jul # "\slash " # aug,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 08:21:28 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2016/04/msp2016040087.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2016:FCd,
  author =       "Anonymous",
  title =        "Front Cover",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "4",
  pages =        "c1--c1",
  month =        jul # "\slash " # aug,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 08:21:28 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2016/04/msp20160400c1.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2016:GFHc,
  author =       "Anonymous",
  title =        "Got flaws? {House} Advertisement",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "4",
  pages =        "c3--c3",
  month =        jul # "\slash " # aug,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 08:21:28 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2016/04/msp20160400c3.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2016:ISPd,
  author =       "Anonymous",
  title =        "{IEEE Security \& Privacy} House Advertisement",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "4",
  pages =        "c4--c4",
  month =        jul # "\slash " # aug,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 08:21:28 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2016/04/msp20160400c4.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2016:RSC,
  author =       "Anonymous",
  title =        "Rock Stars of Cybersecurity House Advertisement",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "4",
  pages =        "c2--c2",
  month =        jul # "\slash " # aug,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 08:21:28 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2016/04/msp20160400c2.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2016:TCe,
  author =       "Anonymous",
  title =        "Table of Contents",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "5",
  pages =        "1--2",
  month =        sep # "\slash " # oct,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 08:21:29 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2016/05/msp2016050001.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Landau:2016:ILI,
  author =       "Susan Landau",
  title =        "Is It Legal? {Is} It Right? {The} Can and Should of
                 Use",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "5",
  pages =        "3--5",
  month =        sep # "\slash " # oct,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 08:21:29 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2016/05/msp2016050003.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2016:Me,
  author =       "Anonymous",
  title =        "Masthead",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "5",
  pages =        "6",
  month =        sep # "\slash " # oct,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 08:21:29 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2016/05/msp2016050006.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Ranum:2016:SBT,
  author =       "Marcus Ranum",
  title =        "{Silver Bullet} Talks with {Gary McGraw}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "5",
  pages =        "7--10",
  month =        sep # "\slash " # oct,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 08:21:29 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2016/05/msp2016050007.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Sasse:2016:SUT,
  author =       "M. Angela Sasse and Matthew Smith",
  title =        "The Security--Usability Tradeoff Myth [{Guest
                 Editors}' introduction]",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "5",
  pages =        "11--13",
  month =        sep # "\slash " # oct,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 08:21:29 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2016/05/msp2016050011.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Theofanos:2016:SUE,
  author =       "Mary Theofanos and Simson Garfinkel and Yee-Yin
                 Choong",
  title =        "Secure and Usable Enterprise Authentication: Lessons
                 from the Field",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "5",
  pages =        "14--21",
  month =        sep # "\slash " # oct,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 08:21:29 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2016/05/msp2016050014-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Caputo:2016:BUS,
  author =       "Deanna D. Caputo and Shari Lawrence Pfleeger and M.
                 Angela Sasse and Paul Ammann and Jeff Offutt and Lin
                 Deng",
  title =        "Barriers to Usable Security? {Three} Organizational
                 Case Studies",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "5",
  pages =        "22--32",
  month =        sep # "\slash " # oct,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 08:21:29 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2016/05/msp2016050022-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Sasse:2016:DSU,
  author =       "M. Angela Sasse and Matthew Smith and Cormac Herley
                 and Heather Lipford and Kami Vaniea",
  title =        "Debunking Security--Usability Tradeoff Myths",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "5",
  pages =        "33--39",
  month =        sep # "\slash " # oct,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 08:21:29 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2016/05/msp2016050033-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Green:2016:DEN,
  author =       "Matthew Green and Matthew Smith",
  title =        "Developers are Not the Enemy!: The Need for Usable
                 Security {APIs}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "5",
  pages =        "40--46",
  month =        sep # "\slash " # oct,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 08:21:29 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2016/05/msp2016050040-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2016:RSP,
  author =       "Anonymous",
  title =        "Rock Stars of Pervasive, Predictive Analytics",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "5",
  pages =        "47",
  month =        sep # "\slash " # oct,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 08:21:29 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2016/05/msp2016050047.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Archer:2016:MPP,
  author =       "David W. Archer and Dan Bogdanov and Benny Pinkas and
                 Pille Pullonen",
  title =        "Maturity and Performance of Programmable Secure
                 Computation",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "5",
  pages =        "48--56",
  month =        sep # "\slash " # oct,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 08:21:29 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2016/05/msp2016050048-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2016:CPSe,
  author =       "Anonymous",
  title =        "Call for Papers Special Issue on Postquantum
                 Cryptography",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "5",
  pages =        "57",
  month =        sep # "\slash " # oct,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 08:21:29 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2016/05/msp2016050057.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Sadeghi:2016:SPWa,
  author =       "Ahmad-Reza Sadeghi and Ghada Dessouky",
  title =        "{Security \& Privacy} Week Interviews, {Part 1}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "5",
  pages =        "58--67",
  month =        sep # "\slash " # oct,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 08:21:29 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2016/05/msp2016050058.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Heimes:2016:GIB,
  author =       "Rita Heimes",
  title =        "Global {InfoSec} and Breach Standards",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "5",
  pages =        "68--72",
  month =        sep # "\slash " # oct,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 08:21:29 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2016/05/msp2016050068-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Flammer:2016:GWB,
  author =       "Ivo Flammer",
  title =        "Genteel Wearables: Bystander-Centered Design",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "5",
  pages =        "73--79",
  month =        sep # "\slash " # oct,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 08:21:29 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2016/05/msp2016050073-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Xu:2016:ASP,
  author =       "Hui Xu and Michael R. Lyu",
  title =        "Assessing the Security Properties of Software
                 Obfuscation",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "5",
  pages =        "80--83",
  month =        sep # "\slash " # oct,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 08:21:29 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2016/05/msp2016050080-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Ladabouche:2016:GIN,
  author =       "Tina Ladabouche and Steve LaFountain",
  title =        "{GenCyber}: Inspiring the Next Generation of Cyber
                 Stars",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "5",
  pages =        "84--86",
  month =        sep # "\slash " # oct,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 08:21:29 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2016/05/msp2016050084-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2016:GF,
  author =       "Anonymous",
  title =        "Got flaws?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "5",
  pages =        "87",
  month =        sep # "\slash " # oct,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 08:21:29 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2016/05/msp2016050087.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Beunardeau:2016:WBC,
  author =       "Marc Beunardeau and Aisling Connolly and Remi Geraud
                 and David Naccache",
  title =        "White-Box Cryptography: Security in an Insecure
                 Environment",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "5",
  pages =        "88--92",
  month =        sep # "\slash " # oct,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 08:21:29 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2016/05/msp2016050088-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Margulies:2016:CYB,
  author =       "Jonathan Margulies and Michael Berg",
  title =        "That Certificate You Bought Could Get You Hacked",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "5",
  pages =        "93--95",
  month =        sep # "\slash " # oct,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 08:21:29 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2016/05/msp2016050093-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Schneier:2016:STF,
  author =       "Bruce Schneier",
  title =        "Stop Trying to Fix the User",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "5",
  pages =        "96",
  month =        sep # "\slash " # oct,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 08:21:29 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2016/05/msp2016050096.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2016:FCe,
  author =       "Anonymous",
  title =        "Front Cover",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "5",
  pages =        "c1--c1",
  month =        sep # "\slash " # oct,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 08:21:29 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2016/05/msp20160500c1.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2016:ICD,
  author =       "Anonymous",
  title =        "{IEEE} Cybersecurity Development {SecDev 2016}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "5",
  pages =        "c2--c2",
  month =        sep # "\slash " # oct,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 08:21:29 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2016/05/msp20160500c2.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2016:ISPe,
  author =       "Anonymous",
  title =        "{IEEE Security \& Privacy}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "5",
  pages =        "c4--c4",
  month =        sep # "\slash " # oct,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 08:21:29 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2016/05/msp20160500c4.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2016:NMOa,
  author =       "Anonymous",
  title =        "New Membership Options for A Better Fit",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "5",
  pages =        "c3--c3",
  month =        sep # "\slash " # oct,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 08:21:29 MST 2016",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2016/05/msp20160500c3.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2016:TCf,
  author =       "Anonymous",
  title =        "Table of Contents",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "6",
  pages =        "1--2",
  month =        nov # "\slash " # dec,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Feb 25 10:03:53 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2016/06/msp2016060001.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{McGraw:2016:SBTe,
  author =       "Gary McGraw",
  title =        "{Silver Bullet} Talks with {Jim Manico}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "6",
  pages =        "3--5",
  month =        nov # "\slash " # dec,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Feb 25 10:03:53 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2016/06/msp2016060003.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2016:Mf,
  author =       "Anonymous",
  title =        "Masthead",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "6",
  pages =        "6",
  month =        nov # "\slash " # dec,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Feb 25 10:03:53 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2016/06/msp2016060006.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Boneh:2016:BCR,
  author =       "Dan Boneh and Kenny Paterson and Nigel P. Smart",
  title =        "Building a Community of Real-World Cryptographers",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "6",
  pages =        "7--9",
  month =        nov # "\slash " # dec,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Feb 25 10:03:53 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2016/06/msp2016060007.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Rogaway:2016:POP,
  author =       "Phillip Rogaway",
  title =        "Practice-Oriented Provable Security and the Social
                 Construction of Cryptography",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "6",
  pages =        "10--17",
  month =        nov # "\slash " # dec,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Feb 25 10:03:53 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2016/06/msp2016060010-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Bhargavan:2016:MVP,
  author =       "Karthikeyan Bhargavan and Cedric Fournet and Markulf
                 Kohlweiss",
  title =        "{miTLS}: Verifying Protocol Implementations against
                 Real-World Attacks",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "6",
  pages =        "18--25",
  month =        nov # "\slash " # dec,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Feb 25 10:03:53 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2016/06/msp2016060018-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Tomb:2016:AVR,
  author =       "Aaron Tomb",
  title =        "Automated Verification of Real-World Cryptographic
                 Implementations",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "6",
  pages =        "26--33",
  month =        nov # "\slash " # dec,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Feb 25 10:03:53 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2016/06/msp2016060026-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Koblitz:2016:RWE,
  author =       "Neal Koblitz and Alfred Menezes",
  title =        "A Riddle Wrapped in an Enigma",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "6",
  pages =        "34--42",
  month =        nov # "\slash " # dec,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Feb 25 10:03:53 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2016/06/msp2016060034-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Dixon:2016:NTO,
  author =       "Lucas Dixon and Thomas Ristenpart and Thomas
                 Shrimpton",
  title =        "Network Traffic Obfuscation and Automated {Internet}
                 Censorship",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "6",
  pages =        "43--53",
  month =        nov # "\slash " # dec,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Feb 25 10:03:53 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2016/06/msp2016060043-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Gueron:2016:MEG,
  author =       "Shay Gueron",
  title =        "Memory Encryption for General-Purpose Processors",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "6",
  pages =        "54--62",
  month =        nov # "\slash " # dec,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Feb 25 10:03:53 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2016/06/msp2016060054-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Lin:2016:SCU,
  author =       "Jingqiang Lin and Bo Luo and Le Guan and Jiwu Jing",
  title =        "Secure Computing Using Registers and Caches: The
                 Problem, Challenges, and Solutions",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "6",
  pages =        "63--70",
  month =        nov # "\slash " # dec,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Feb 25 10:03:53 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2016/06/msp2016060063-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Sadeghi:2016:SPWb,
  author =       "Ahmad-Reza Sadeghi and Ghada Dessouky",
  title =        "{Security \& Privacy} Week Interviews, Part 2",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "6",
  pages =        "71--80",
  month =        nov # "\slash " # dec,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Feb 25 10:03:53 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2016/06/msp2016060071-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Tene:2016:MVU,
  author =       "Omer Tene",
  title =        "{Microsoft v. USA}: Location of Data and the Law of
                 the Horse",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "6",
  pages =        "81--85",
  month =        nov # "\slash " # dec,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Feb 25 10:03:53 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2016/06/msp2016060081-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Fetzer:2016:BCA,
  author =       "Christof Fetzer",
  title =        "Building Critical Applications Using Microservices",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "6",
  pages =        "86--89",
  month =        nov # "\slash " # dec,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Feb 25 10:03:53 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2016/06/msp2016060086-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Pusey:2016:OCC,
  author =       "Portia Pusey and Mark Gondree and Zachary Peterson",
  title =        "The Outcomes of Cybersecurity Competitions and
                 Implications for Underrepresented Populations",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "6",
  pages =        "90--95",
  month =        nov # "\slash " # dec,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Feb 25 10:03:53 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2016/06/msp2016060090-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Bellovin:2016:EEE,
  author =       "Steven M. Bellovin",
  title =        "Easy Email Encryption",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "6",
  pages =        "96--96",
  month =        nov # "\slash " # dec,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Feb 25 10:03:53 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2016/06/msp2016060096.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2016:CYI,
  author =       "Anonymous",
  title =        "Can You Invent a Better World through Technologies?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "6",
  pages =        "c4--c4",
  month =        nov # "\slash " # dec,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Feb 25 10:03:53 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2016/06/msp20160600c4.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2016:FCf,
  author =       "Anonymous",
  title =        "Front Cover",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "6",
  pages =        "c1--c1",
  month =        nov # "\slash " # dec,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Feb 25 10:03:53 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2016/06/msp20160600c1.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2016:NMOb,
  author =       "Anonymous",
  title =        "New Membership Options for a Better Fit",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "6",
  pages =        "c2--c2",
  month =        nov # "\slash " # dec,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Feb 25 10:03:53 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2016/06/msp20160600c2.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2016:T,
  author =       "Anonymous",
  title =        "{TechIgnite}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "14",
  number =       "6",
  pages =        "c3--c3",
  month =        nov # "\slash " # dec,
  year =         "2016",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Feb 25 10:03:53 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2016/06/msp20160600c3.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2017:TCa,
  author =       "Anonymous",
  title =        "Table of Contents",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "1",
  pages =        "1--2",
  month =        jan # "\slash " # feb,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Feb 25 10:03:53 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/01/msp2017010001.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Sadeghi:2017:SPM,
  author =       "Ahmad-Reza Sadeghi",
  title =        "Security and Privacy More Crucial than Ever",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "1",
  pages =        "3--4",
  month =        jan # "\slash " # feb,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Feb 25 10:03:53 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/01/msp2017010003.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2017:Ma,
  author =       "Anonymous",
  title =        "Masthead",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "1",
  pages =        "5",
  month =        jan # "\slash " # feb,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Feb 25 10:03:53 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/01/msp2017010005.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2017:RT,
  author =       "Anonymous",
  title =        "Reviewer Thanks",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "1",
  pages =        "6--7",
  month =        jan # "\slash " # feb,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Feb 25 10:03:53 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/01/msp2017010006.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{McGraw:2017:SBTa,
  author =       "Gary McGraw",
  title =        "{Silver Bullet} Talks with {Marie Moe}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "1",
  pages =        "8--11",
  month =        jan # "\slash " # feb,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Feb 25 10:03:53 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/01/msp2017010008.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Bellatti:2017:DHD,
  author =       "Jacob Bellatti and Andrew Brunner and Joseph Lewis and
                 Prasad Annadata and Wisam Eltarjaman and Rinku Dewri
                 and Ramakrishna Thurimella",
  title =        "Driving Habits Data: Location Privacy Implications and
                 Solutions",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "1",
  pages =        "12--20",
  month =        jan # "\slash " # feb,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Feb 25 10:03:53 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/01/msp2017010012-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2017:CPSa,
  author =       "Anonymous",
  title =        "Call for Papers: Special Issue on Hacking without
                 Humans",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "1",
  pages =        "21",
  month =        jan # "\slash " # feb,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Feb 25 10:03:53 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/01/msp2017010021.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Oluwatimi:2017:OMC,
  author =       "Oyindamola Oluwatimi and Daniele Midi and Elisa
                 Bertino",
  title =        "Overview of Mobile Containerization Approaches and
                 Open Research Directions",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "1",
  pages =        "22--31",
  month =        jan # "\slash " # feb,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Feb 25 10:03:53 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/01/msp2017010022-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Lubomski:2017:PEI,
  author =       "Pawel Lubomski and Henryk Krawczyk",
  title =        "Practical Evaluation of {Internet} Systems' Security
                 Mechanisms",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "1",
  pages =        "32--40",
  month =        jan # "\slash " # feb,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Feb 25 10:03:53 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/01/msp2017010032-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2017:CPSb,
  author =       "Anonymous",
  title =        "Call for Papers: Special Issue on Digital Forensics",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "1",
  pages =        "41",
  month =        jan # "\slash " # feb,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Feb 25 10:03:53 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/01/msp2017010041.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Kolhar:2017:CDA,
  author =       "Manjur Kolhar and Mosleh M. Abu-Alhaj and Saied M. Abd
                 El-atty",
  title =        "Cloud Data Auditing Techniques with a Focus on Privacy
                 and Security",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "1",
  pages =        "42--51",
  month =        jan # "\slash " # feb,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Feb 25 10:03:53 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/01/msp2017010042-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Kalaimannan:2017:SDL,
  author =       "Ezhil Kalaimannan and Jatinder N. D. Gupta",
  title =        "The Security Development Lifecycle in the Context of
                 Accreditation Policies and Standards",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "1",
  pages =        "52--57",
  month =        jan # "\slash " # feb,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Feb 25 10:03:53 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/01/msp2017010052-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Homaei:2017:SYS,
  author =       "Hossein Homaei and Hamid Reza Shahriari",
  title =        "Seven Years of Software Vulnerabilities: The Ebb and
                 Flow",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "1",
  pages =        "58--65",
  month =        jan # "\slash " # feb,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Feb 25 10:03:53 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/01/msp2017010058-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Sadeghi:2017:SPW,
  author =       "Ahmad-Reza Sadeghi and Ghada Dessouky",
  title =        "Security \& Privacy Week Interviews, Part 3",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "1",
  pages =        "66--74",
  month =        jan # "\slash " # feb,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Feb 25 10:03:53 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/01/msp2017010066-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Roesner:2017:DAP,
  author =       "Franziska Roesner",
  title =        "Designing Application Permission Models that Meet User
                 Expectations",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "1",
  pages =        "75--79",
  month =        jan # "\slash " # feb,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Feb 25 10:03:53 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/01/msp2017010075-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Kshetri:2017:ORS,
  author =       "Nir Kshetri",
  title =        "An Opinion on the {``Report on Securing and Growing
                 the Digital Economy''}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "1",
  pages =        "80--85",
  month =        jan # "\slash " # feb,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Feb 25 10:03:53 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/01/msp2017010080-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2017:FYJa,
  author =       "Anonymous",
  title =        "Focus on Your Job Search",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "1",
  pages =        "86",
  month =        jan # "\slash " # feb,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Feb 25 10:03:53 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/01/msp2017010086.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Geer:2017:MDD,
  author =       "Daniel E. Geer and Richard Danzig",
  title =        "Mutual Dependence Demands Mutual Sharing",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "1",
  pages =        "87--88",
  month =        jan # "\slash " # feb,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Feb 25 10:03:53 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/01/msp2017010087.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2017:FCa,
  author =       "Anonymous",
  title =        "Front Cover",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "1",
  pages =        "c1--c1",
  month =        jan # "\slash " # feb,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Feb 25 10:03:53 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/01/msp20170100c1.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2017:T,
  author =       "Anonymous",
  title =        "{TechIgnite}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "1",
  pages =        "c2--c2",
  month =        jan # "\slash " # feb,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Feb 25 10:03:53 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/01/msp20170100c2.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2017:NMOa,
  author =       "Anonymous",
  title =        "New Membership Options for a Better Fit",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "1",
  pages =        "c3--c3",
  month =        jan # "\slash " # feb,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Feb 25 10:03:53 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/01/msp20170100c3.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2017:ISPa,
  author =       "Anonymous",
  title =        "{IEEE Security \& Privacy}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "1",
  pages =        "c4--c4",
  month =        jan # "\slash " # feb,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Feb 25 10:03:53 MST 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/01/msp20170100c4.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2017:UMU,
  author =       "Anonymous",
  title =        "Unwavering Mission Unwavering Commitment
                 Advertisement",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "2",
  pages =        "1",
  month =        mar # "\slash " # apr,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 25 21:35:07 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/02/msp2017020001.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2017:SHA,
  author =       "Anonymous",
  title =        "Not so Secure House Advertisement",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "2",
  pages =        "2",
  month =        mar # "\slash " # apr,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 25 21:35:07 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/02/msp2017020002.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2017:TCb,
  author =       "Anonymous",
  title =        "Table of Contents",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "2",
  pages =        "3--4",
  month =        mar # "\slash " # apr,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 25 21:35:07 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/02/msp2017020003.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Epstein:2017:PCD,
  author =       "Jeremy Epstein",
  title =        "Privacy is Context Dependent",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "2",
  pages =        "5--6",
  month =        mar # "\slash " # apr,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 25 21:35:07 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/02/msp2017020005.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2017:Mb,
  author =       "Anonymous",
  title =        "Masthead",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "2",
  pages =        "7",
  month =        mar # "\slash " # apr,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 25 21:35:07 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/02/msp2017020007.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{McGraw:2017:SBTb,
  author =       "Gary McGraw",
  title =        "{Silver Bullet} Talks with {Lesley Carhart}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "2",
  pages =        "8--10",
  month =        mar # "\slash " # apr,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 25 21:35:07 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/02/msp2017020008.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Benzel:2017:SPI,
  author =       "Terry Benzel",
  title =        "Selected Papers from the {2016 IEEE Symposium on
                 Security and Privacy}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "2",
  pages =        "11--13",
  month =        mar # "\slash " # apr,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 25 21:35:07 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/02/msp2017020011.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2017:PPS,
  author =       "Anonymous",
  title =        "Prepose: Privacy, Security, and Reliability for
                 Gesture-Based Programming",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "2",
  pages =        "14--23",
  month =        mar # "\slash " # apr,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2017.44",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 25 21:35:07 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/02/msp2017020014-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2017:SIP,
  author =       "Anonymous",
  title =        "Security Implications of Permission Models in
                 Smart-Home Application Frameworks",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "2",
  pages =        "24--30",
  month =        mar # "\slash " # apr,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2017.43",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 25 21:35:07 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/02/msp2017020024-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2017:FYJb,
  author =       "Anonymous",
  title =        "Focus on Your Job Search House Advertisement",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "2",
  pages =        "31",
  month =        mar # "\slash " # apr,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 25 21:35:07 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/02/msp2017020031.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2017:PUT,
  author =       "Anonymous",
  title =        "The Perils of User Tracking Using Zero-Permission
                 Mobile Apps",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "2",
  pages =        "32--41",
  month =        mar # "\slash " # apr,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2017.25",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 25 21:35:07 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/02/msp2017020032-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2017:AZH,
  author =       "Anonymous",
  title =        "{Apple ZeroConf} Holes: How Hackers Can Steal {iPhone}
                 Photos",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "2",
  pages =        "42--49",
  month =        mar # "\slash " # apr,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2017.23",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 25 21:35:07 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/02/msp2017020042-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2017:HIR,
  author =       "Anonymous",
  title =        "How {Internet} Resources Might Be Helping You Develop
                 Faster but Less Securely",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "2",
  pages =        "50--60",
  month =        mar # "\slash " # apr,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2017.24",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 25 21:35:07 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/02/msp2017020050-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2017:BRR,
  author =       "Anonymous",
  title =        "{2017 B. Ramakrishna Rau Award} Call for Nominations
                 House Advertisement",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "2",
  pages =        "61",
  month =        mar # "\slash " # apr,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 25 21:35:07 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/02/msp2017020061.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2017:DUD,
  author =       "Anonymous",
  title =        "The Danger of {USB} Drives",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "2",
  pages =        "62--69",
  month =        mar # "\slash " # apr,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2017.41",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 25 21:35:07 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/02/msp2017020062-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2017:DDD,
  author =       "Anonymous",
  title =        "Dawn of the Dead Domain: Measuring the Exploitation of
                 Residual Trust in Domains",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "2",
  pages =        "70--77",
  month =        mar # "\slash " # apr,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2017.42",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 25 21:35:07 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/02/msp2017020070-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2017:DOC,
  author =       "Anonymous",
  title =        "Does the Online Card Payment Landscape Unwittingly
                 Facilitate Fraud?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "2",
  pages =        "78--86",
  month =        mar # "\slash " # apr,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2017.27",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 25 21:35:07 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/02/msp2017020078-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2017:MHA,
  author =       "Anonymous",
  title =        "{myCS} House Advertisement",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "2",
  pages =        "87",
  month =        mar # "\slash " # apr,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 25 21:35:07 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/02/msp2017020087.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Sadeghi:2017:ACIa,
  author =       "Ahmad-Reza Sadeghi and Shaza Zeitouni",
  title =        "{ACM CCS 2016} Interviews, Part 1",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "2",
  pages =        "88--91",
  month =        mar # "\slash " # apr,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2017.26",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 25 21:35:07 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/02/msp2017020088-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2017:DIS,
  author =       "Anonymous",
  title =        "Does Industry Self-Regulation of Consumer Data Privacy
                 Work?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "2",
  pages =        "92--95",
  month =        mar # "\slash " # apr,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2017.45",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 25 21:35:07 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/02/msp2017020092-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2017:SCO,
  author =       "Anonymous",
  title =        "Security Challenges and Opportunities of
                 Software-Defined Networking",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "2",
  pages =        "96--100",
  month =        mar # "\slash " # apr,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2017.46",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 25 21:35:07 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/02/msp2017020096-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2017:CNEa,
  author =       "Anonymous",
  title =        "Call for Nominees Education Awards Nominations House
                 Advertisement",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "2",
  pages =        "101",
  month =        mar # "\slash " # apr,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 25 21:35:07 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/02/msp2017020101.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2017:HBC,
  author =       "Anonymous",
  title =        "How Businesses Can Speed Up International Cybercrime
                 Investigation",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "2",
  pages =        "102--106",
  month =        mar # "\slash " # apr,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2017.40",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 25 21:35:07 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/02/msp2017020102-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2017:ICSa,
  author =       "Anonymous",
  title =        "{IEEE Computer Society} 2017 Call for Major Award
                 Nominations House Advertisement",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "2",
  pages =        "107",
  month =        mar # "\slash " # apr,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 25 21:35:07 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/02/msp2017020107.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Schneier:2017:ITW,
  author =       "Bruce Schneier",
  title =        "The {Internet of Things} Will Upend Our Industry",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "2",
  pages =        "108",
  month =        mar # "\slash " # apr,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 25 21:35:07 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/02/msp2017020108.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2017:BSN,
  author =       "Anonymous",
  title =        "Behind the Scenes at {NSA} Advertisement",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "2",
  pages =        "c2--c2",
  month =        mar # "\slash " # apr,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 25 21:35:07 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/02/msp20170200c2.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2017:FCb,
  author =       "Anonymous",
  title =        "Front Cover",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "2",
  pages =        "c1--c1",
  month =        mar # "\slash " # apr,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 25 21:35:07 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/02/msp20170200c1.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2017:ISPb,
  author =       "Anonymous",
  title =        "{IEEE Security \& Privacy}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "2",
  pages =        "c4--c4",
  month =        mar # "\slash " # apr,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 25 21:35:07 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/02/msp20170200c4.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2017:NMOb,
  author =       "Anonymous",
  title =        "New Membership Options for A Better Fit. House
                 Advertisement",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "2",
  pages =        "c3--c3",
  month =        mar # "\slash " # apr,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 25 21:35:07 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/02/msp20170200c3.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2017:TCc,
  author =       "Anonymous",
  title =        "Table of Contents",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "3",
  pages =        "1--2",
  month =        may # "\slash " # jun,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 25 21:35:08 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/03/msp2017030001.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2017:EIS,
  author =       "Anonymous",
  title =        "Ethics in Information Security",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "3",
  pages =        "3--4",
  month =        may # "\slash " # jun,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 25 21:35:08 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/03/msp2017030003.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2017:Mc,
  author =       "Anonymous",
  title =        "Masthead",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "3",
  pages =        "5",
  month =        may # "\slash " # jun,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 25 21:35:08 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/03/msp2017030005.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{McGraw:2017:SBTc,
  author =       "Gary McGraw",
  title =        "{Silver Bullet} Talks with {Kate Pearce}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "3",
  pages =        "6--9",
  month =        may # "\slash " # jun,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 25 21:35:08 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/03/msp2017030006.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2017:NMOc,
  author =       "Anonymous",
  title =        "New Membership Options for A Better Fit",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "3",
  pages =        "10",
  month =        may # "\slash " # jun,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 25 21:35:08 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/03/msp2017030010.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2017:AYC,
  author =       "Anonymous",
  title =        "Achieve your career goals with the fit that's right
                 for you.",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "3",
  pages =        "11",
  month =        may # "\slash " # jun,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 25 21:35:08 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/03/msp2017030011.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Benaloh:2017:VC,
  author =       "Josh Benaloh and Peter Y. A. Ryan and Steve Schneider
                 and Vanessa Teague",
  title =        "A Vote of Confidence?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "3",
  pages =        "12--13",
  month =        may # "\slash " # jun,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 25 21:35:08 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/03/msp2017030012.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Kiayias:2017:EEV,
  author =       "Aggelos Kiayias and Thomas Zacharias and Bingsheng
                 Zhang",
  title =        "An Efficient {E2E} Verifiable {E}-voting System
                 without Setup Assumptions",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "3",
  pages =        "14--23",
  month =        may # "\slash " # jun,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2017.71",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 25 21:35:08 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/03/msp2017030014-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Kulyk:2017:NCF,
  author =       "Oksana Kulyk and Stephan Neumann and Jurlind Budurushi
                 and Melanie Volkamer",
  title =        "Nothing Comes for Free: How Much Usability Can You
                 Sacrifice for Security?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "3",
  pages =        "24--29",
  month =        may # "\slash " # jun,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2017.70",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 25 21:35:08 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/03/msp2017030024-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Essex:2017:DDU,
  author =       "Aleksander Essex",
  title =        "Detecting the Detectable: Unintended Consequences of
                 Cryptographic Election Verification",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "3",
  pages =        "30--38",
  month =        may # "\slash " # jun,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2017.69",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 25 21:35:08 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/03/msp2017030030-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2017:CPSc,
  author =       "Anonymous",
  title =        "Call for Papers: Special Issue on {AI} Ethics: The
                 Privacy Challenge",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "3",
  pages =        "39",
  month =        may # "\slash " # jun,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 25 21:35:08 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/03/msp2017030039.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{vandeGraaf:2017:LTT,
  author =       "Jeroen van de Graaf",
  title =        "Long-Term Threats to Ballot Privacy",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "3",
  pages =        "40--47",
  month =        may # "\slash " # jun,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2017.77",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 25 21:35:08 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/03/msp2017030040-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Rivest:2017:WEV,
  author =       "Ronald L. Rivest and Philip B. Stark",
  title =        "When Is an Election Verifiable?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "3",
  pages =        "48--50",
  month =        may # "\slash " # jun,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2017.78",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 25 21:35:08 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/03/msp2017030048-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2017:CNEb,
  author =       "Anonymous",
  title =        "Call for Nominees: Education Awards Nominations",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "3",
  pages =        "51",
  month =        may # "\slash " # jun,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 25 21:35:08 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/03/msp2017030051.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Ranganathan:2017:WRC,
  author =       "Aanjhan Ranganathan and Srdjan Capkun",
  title =        "Are We Really Close? {Verifying} Proximity in Wireless
                 Systems",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "3",
  pages =        "52--58",
  month =        may # "\slash " # jun,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2017.56",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 25 21:35:08 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/03/msp2017030052-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2017:ICSb,
  author =       "Anonymous",
  title =        "{IEEE Computer Society} 2017 Call for Major Award
                 Nominations",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "3",
  pages =        "59",
  month =        may # "\slash " # jun,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 25 21:35:08 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/03/msp2017030059.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Aikat:2017:RSE,
  author =       "Jay Aikat and Aditya Akella and Jeffrey S. Chase and
                 Ari Juels and Michael K. Reiter and Thomas Ristenpart
                 and Vyas Sekar and Michael Swift",
  title =        "Rethinking Security in the Era of Cloud Computing",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "3",
  pages =        "60--69",
  month =        may # "\slash " # jun,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2017.80",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 25 21:35:08 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/03/msp2017030060-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Sadeghi:2017:ACIb,
  author =       "Ahmad-Reza Sadeghi and Shaza Zeitouni",
  title =        "{ACM CCS 2016} Interviews, Part 2",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "3",
  pages =        "70--76",
  month =        may # "\slash " # jun,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 25 21:35:08 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/03/msp2017030070.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2017:ICSc,
  author =       "Anonymous",
  title =        "{IEEE Computer Society}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "3",
  pages =        "77",
  month =        may # "\slash " # jun,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 25 21:35:08 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/03/msp2017030077.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Gupta:2017:MLP,
  author =       "Chetan Gupta",
  title =        "The Market's Law of Privacy: Case Studies in Privacy
                 and Security Adoption",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "3",
  pages =        "78--83",
  month =        may # "\slash " # jun,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2017.57",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 25 21:35:08 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/03/msp2017030078-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Peddinti:2017:UAT,
  author =       "Sai Teja Peddinti and Keith W. Ross and Justin
                 Cappos",
  title =        "User Anonymity on {Twitter}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "3",
  pages =        "84--87",
  month =        may # "\slash " # jun,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2017.74",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 25 21:35:08 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/03/msp2017030084-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2017:Md,
  author =       "Anonymous",
  title =        "{myCS}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "3",
  pages =        "88",
  month =        may # "\slash " # jun,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 25 21:35:08 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/03/msp2017030088.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2017:ICSd,
  author =       "Anonymous",
  title =        "{IEEE Computer Society Harlan D. Mills Award}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "3",
  pages =        "89",
  month =        may # "\slash " # jun,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 25 21:35:08 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/03/msp2017030089.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Weiss:2017:CEA,
  author =       "Richard Weiss and Franklyn Turbak and Jens Mache and
                 Michael E. Locasto",
  title =        "Cybersecurity Education and Assessment in {EDURange}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "3",
  pages =        "90--95",
  month =        may # "\slash " # jun,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2017.54",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 25 21:35:08 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/03/msp2017030090-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Bellovin:2017:JI,
  author =       "Steven M. Bellovin",
  title =        "Jurisdiction and the {Internet}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "3",
  pages =        "96",
  month =        may # "\slash " # jun,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 25 21:35:08 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/03/msp2017030096.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2017:CPSd,
  author =       "Anonymous",
  title =        "Call for Papers: Special Issue on Hacking without
                 Humans",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "3",
  pages =        "c2--c2",
  month =        may # "\slash " # jun,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 25 21:35:08 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/03/msp20170300c2.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2017:FCc,
  author =       "Anonymous",
  title =        "Front Cover",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "3",
  pages =        "c1--c1",
  month =        may # "\slash " # jun,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 25 21:35:08 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/03/msp20170300c1.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2017:FYJc,
  author =       "Anonymous",
  title =        "Focus on Your Job Search",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "3",
  pages =        "c3--c3",
  month =        may # "\slash " # jun,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 25 21:35:08 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/03/msp20170300c3.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2017:ISPc,
  author =       "Anonymous",
  title =        "{IEEE Security \& Privacy}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "3",
  pages =        "c4--c4",
  month =        may # "\slash " # jun,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 25 21:35:08 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/03/msp20170300c4.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2017:TCd,
  author =       "Anonymous",
  title =        "Table of contents",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "4",
  pages =        "1--2",
  month =        jul # "\slash " # aug,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Aug 29 06:15:10 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/04/msp2017040001.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2017:AIA,
  author =       "Anonymous",
  title =        "Authorship Integrity and Attacks",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "4",
  pages =        "3--5",
  month =        jul # "\slash " # aug,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Aug 29 06:15:10 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/04/msp2017040003.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2017:Me,
  author =       "Anonymous",
  title =        "Masthead",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "4",
  pages =        "6",
  month =        jul # "\slash " # aug,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Aug 29 06:15:10 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/04/msp2017040006.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{McGraw:2017:SBTd,
  author =       "Gary McGraw",
  title =        "{Silver Bullet} Talks with {Kelly Lum}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "4",
  pages =        "7--10",
  month =        jul # "\slash " # aug,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Aug 29 06:15:10 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/04/msp2017040007.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2017:LBT,
  author =       "Anonymous",
  title =        "Looking for the {BEST} Tech Job for You?
                 [advertisement]",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "4",
  pages =        "11",
  month =        jul # "\slash " # aug,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Aug 29 06:15:10 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/04/msp2017040011.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Buchmann:2017:PCS,
  author =       "Johannes Buchmann and Kristin Lauter and Michele
                 Mosca",
  title =        "Postquantum Cryptography --- State of the Art",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "4",
  pages =        "12--13",
  month =        jul # "\slash " # aug,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Aug 29 06:15:10 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/04/msp2017040012.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Mulholland:2017:DCD,
  author =       "John Mulholland and Michele Mosca and Johannes Braun",
  title =        "The Day the Cryptography Dies",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "4",
  pages =        "14--21",
  month =        jul # "\slash " # aug,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2017.3151325",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Aug 29 06:15:10 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/04/msp2017040014-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Lauter:2017:POL,
  author =       "Kristin Lauter",
  title =        "Postquantum Opportunities: Lattices, Homomorphic
                 Encryption, and Supersingular Isogeny Graphs",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "4",
  pages =        "22--27",
  month =        jul # "\slash " # aug,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2017.3151338",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Aug 29 06:15:10 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/04/msp2017040022-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Ding:2017:CSM,
  author =       "Jintai Ding and Albrecht Petzoldt",
  title =        "Current State of Multivariate Cryptography",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "4",
  pages =        "28--36",
  month =        jul # "\slash " # aug,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2017.3151328",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Aug 29 06:15:10 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/04/msp2017040028-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Butin:2017:HBS,
  author =       "Denis Butin",
  title =        "Hash-Based Signatures: State of Play",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "4",
  pages =        "37--43",
  month =        jul # "\slash " # aug,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2017.3151334",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Aug 29 06:15:10 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/hash.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/04/msp2017040037-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Sendrier:2017:CBC,
  author =       "Nicolas Sendrier",
  title =        "Code-Based Cryptography: State of the Art and
                 Perspectives",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "4",
  pages =        "44--50",
  month =        jul # "\slash " # aug,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2017.3151345",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Aug 29 06:15:10 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/04/msp2017040044-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Chen:2017:CSQ,
  author =       "Lidong Chen",
  title =        "Cryptography Standards in Quantum Time: New Wine in an
                 Old Wineskin?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "4",
  pages =        "51--57",
  month =        jul # "\slash " # aug,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2017.3151339",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Aug 29 06:15:10 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/04/msp2017040051-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Sadeghi:2017:ACIc,
  author =       "Ahmad-Reza Sadeghi and Shaza Zeitouni",
  title =        "{ACM} {CCS} 2016 Interview, Part 3",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "4",
  pages =        "58--61",
  month =        jul # "\slash " # aug,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Aug 29 06:15:10 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/04/msp2017040058.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Knijnenburg:2017:PCE,
  author =       "Bart P. Knijnenburg",
  title =        "Privacy? {I} Can't Even! {Making} a Case for
                 User-Tailored Privacy",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "4",
  pages =        "62--67",
  month =        jul # "\slash " # aug,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2017.3151331",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Aug 29 06:15:10 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/04/msp2017040062-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Reinicke:2017:RDS,
  author =       "Bryan Reinicke and Jeffrey Cummings and Howard
                 Kleinberg",
  title =        "The Right to Digital Self-Defense",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "4",
  pages =        "68--71",
  month =        jul # "\slash " # aug,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2017.3151324",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Aug 29 06:15:10 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/04/msp2017040068-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Sherman:2017:ICC,
  author =       "Alan Sherman and Melissa Dark and Agnes Chan and Rylan
                 Chong and Thomas Morris and Linda Oliva and John
                 Springer and Bhavani Thuraisingham and Christopher
                 Vatcher and Rakesh Verma and Susanne Wetzel",
  title =        "{INSuRE}: Collaborating Centers of Academic Excellence
                 Engage Students in Cybersecurity Research",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "4",
  pages =        "72--78",
  month =        jul # "\slash " # aug,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2017.3151327",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Aug 29 06:15:10 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/04/msp2017040072-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Fernandes:2017:ITS,
  author =       "Earlence Fernandes and Amir Rahmati and Kevin Eykholt
                 and Atul Prakash",
  title =        "{Internet of Things} Security Research: A Rehash of
                 Old Ideas or New Intellectual Challenges?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "4",
  pages =        "79--84",
  month =        jul # "\slash " # aug,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2017.3151346",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Aug 29 06:15:10 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/04/msp2017040079-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Batcheller:2017:BSB,
  author =       "Archer Batcheller and Summer Craze Fowler and Robert
                 Cunningham and Dinara Doyle and Trent Jaeger and Ulf
                 Lindqvist",
  title =        "Building on the Success of Building Security In",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "4",
  pages =        "85--87",
  month =        jul # "\slash " # aug,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Aug 29 06:15:10 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/04/msp2017040085.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Geer:2017:A,
  author =       "Daniel E. Geer",
  title =        "Attribution",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "4",
  pages =        "88",
  month =        jul # "\slash " # aug,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Aug 29 06:15:10 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/04/msp2017040088.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2017:CPSe,
  author =       "Anonymous",
  title =        "Call for Papers Special Issue on {AI} Ethics: The
                 Privacy Challenge",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "4",
  pages =        "c2--c2",
  month =        jul # "\slash " # aug,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Aug 29 06:15:10 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/04/msp20170400c2.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2017:FCd,
  author =       "Anonymous",
  title =        "Front Cover",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "4",
  pages =        "c1--c1",
  month =        jul # "\slash " # aug,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Aug 29 06:15:10 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/04/msp20170400c1.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2017:ISPd,
  author =       "Anonymous",
  title =        "{IEEE Security \& Privacy}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "4",
  pages =        "c4--c4",
  month =        jul # "\slash " # aug,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Aug 29 06:15:10 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/04/msp20170400c4.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2017:NMOd,
  author =       "Anonymous",
  title =        "New membership options for a better fit
                 [advertisement]",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "4",
  pages =        "c3--c3",
  month =        jul # "\slash " # aug,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Aug 29 06:15:10 MDT 2017",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/04/msp20170400c3.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2017:TCe,
  author =       "Anonymous",
  title =        "Table of Contents",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "5",
  pages =        "1--2",
  month =        sep # "\slash " # oct,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Jan 20 08:55:34 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/05/msp2017050001.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2017:AIC,
  author =       "Anonymous",
  title =        "{AI} Industrial Complex: The Challenge of {AI}
                 Ethics",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "5",
  pages =        "3--5",
  month =        sep # "\slash " # oct,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Jan 20 08:55:34 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/05/msp2017050003.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2017:Mf,
  author =       "Anonymous",
  title =        "Masthead",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "5",
  pages =        "6",
  month =        sep # "\slash " # oct,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Jan 20 08:55:34 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/05/msp2017050006.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{McGraw:2017:SBTe,
  author =       "Gary McGraw",
  title =        "{Silver Bullet} Talks with {Ksenia
                 Dmitrieva-Peguero}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "5",
  pages =        "7--9",
  month =        sep # "\slash " # oct,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Jan 20 08:55:34 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/05/msp2017050007.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Hubaux:2017:GDP,
  author =       "Jean-Pierre Hubaux and Stefan Katzenbeisser and
                 Bradley Malin",
  title =        "Genomic Data Privacy and Security: Where We Stand and
                 Where We Are Heading",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "5",
  pages =        "10--12",
  month =        sep # "\slash " # oct,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Jan 20 08:55:34 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/05/msp2017050010.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2017:CNEc,
  author =       "Anonymous",
  title =        "Call for Nominees Education Awards Nominations",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "5",
  pages =        "13",
  month =        sep # "\slash " # oct,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Jan 20 08:55:34 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/05/msp2017050013.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Savage:2017:CRH,
  author =       "Sara Renee Savage",
  title =        "Characterizing the Risks and Harms of Linking Genomic
                 Information to Individuals",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "5",
  pages =        "14--19",
  month =        sep # "\slash " # oct,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2017.3681064",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Jan 20 08:55:34 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/05/msp2017050014-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Blanton:2017:ISE,
  author =       "Marina Blanton and Fattaneh Bayatbabolghani",
  title =        "Improving the Security and Efficiency of Private
                 Genomic Computation Using Server Aid",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "5",
  pages =        "20--28",
  month =        sep # "\slash " # oct,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2017.3681056",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Jan 20 08:55:34 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/05/msp2017050020-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Ayday:2017:IAA,
  author =       "Erman Ayday and Mathias Humbert",
  title =        "Inference Attacks against Kin Genomic Privacy",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "5",
  pages =        "29--37",
  month =        sep # "\slash " # oct,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2017.3681052",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Jan 20 08:55:34 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/05/msp2017050029-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Bradley:2017:GSL,
  author =       "Tatiana Bradley and Xuhua Ding and Gene Tsudik",
  title =        "Genomic Security (Lest We Forget)",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "5",
  pages =        "38--46",
  month =        sep # "\slash " # oct,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2017.3681055",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Jan 20 08:55:34 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/05/msp2017050038-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Dedeke:2017:CFA,
  author =       "Adenekan Dedeke",
  title =        "Cybersecurity Framework Adoption: Using Capability
                 Levels for Implementation Tiers and Profiles",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "5",
  pages =        "47--54",
  month =        sep # "\slash " # oct,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2017.3681063",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Jan 20 08:55:34 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/05/msp2017050047-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Reeder:2017:SSS,
  author =       "Robert W. Reeder and Iulia Ion and Sunny Consolvo",
  title =        "152 Simple Steps to Stay Safe Online: Security Advice
                 for Non-Tech-Savvy Users",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "5",
  pages =        "55--64",
  month =        sep # "\slash " # oct,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Jan 20 08:55:34 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/05/msp2017050055.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Kott:2017:AMI,
  author =       "Alexander Kott and Jackson Ludwig and Mona Lange",
  title =        "Assessing Mission Impact of Cyberattacks: Toward a
                 Model-Driven Paradigm",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "5",
  pages =        "65--74",
  month =        sep # "\slash " # oct,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2017.3681068",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Jan 20 08:55:34 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/05/msp2017050065-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2017:TCL,
  author =       "Anonymous",
  title =        "Take the {CS Library} wherever you go!",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "5",
  pages =        "75",
  month =        sep # "\slash " # oct,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Jan 20 08:55:34 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/05/msp2017050075.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Matthews:2017:SPE,
  author =       "Tara Matthews and Kathleen OLeary and Anna Turner and
                 Manya Sleeper and Jill Palzkill Woelfer and Martin
                 Shelton and Cori Manthorne and Elizabeth F. Churchill
                 and Sunny Consolvo",
  title =        "Security and Privacy Experiences and Practices of
                 Survivors of Intimate Partner Abuse",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "5",
  pages =        "76--81",
  month =        sep # "\slash " # oct,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Jan 20 08:55:34 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/05/msp2017050076.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Oppliger:2017:DAB,
  author =       "Rolf Oppliger",
  title =        "Disillusioning {Alice} and {Bob}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "5",
  pages =        "82--84",
  month =        sep # "\slash " # oct,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2017.3681057",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Jan 20 08:55:34 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/05/msp2017050082-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Traynor:2017:FAS,
  author =       "Patrick Traynor and Kevin Butler and Jasmine Bowers
                 and Bradley Reaves",
  title =        "{FinTechSec}: Addressing the Security Challenges of
                 Digital Financial Services",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "5",
  pages =        "85--89",
  month =        sep # "\slash " # oct,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2017.3681060",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Jan 20 08:55:34 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/05/msp2017050085-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{OReilly:2017:ARD,
  author =       "David OReilly",
  title =        "Availability of Required Data to Support Criminal
                 Investigations Involving Large-Scale {IP}
                 Address-Sharing Technologies",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "5",
  pages =        "90--93",
  month =        sep # "\slash " # oct,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2017.3681047",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Jan 20 08:55:34 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/05/msp2017050090-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Peisert:2017:OSC,
  author =       "Sean Peisert and Von Welch",
  title =        "The Open Science Cyber Risk Profile: The {Rosetta
                 Stone} for Open Science and Cybersecurity",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "5",
  pages =        "94--95",
  month =        sep # "\slash " # oct,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2017.3681058",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Jan 20 08:55:34 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/05/msp2017050094-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Schneier:2017:ISW,
  author =       "Bruce Schneier",
  title =        "{IoT} Security: What's {Plan B}?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "5",
  pages =        "96",
  month =        sep # "\slash " # oct,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Jan 20 08:55:34 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/05/msp2017050096.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2017:CPSf,
  author =       "Anonymous",
  title =        "Call for Papers Special Issue on Security and Privacy
                 Research in {Brazil}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "5",
  pages =        "c2--c2",
  month =        sep # "\slash " # oct,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Jan 20 08:55:34 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/05/msp20170500c2.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2017:FCe,
  author =       "Anonymous",
  title =        "Front Cover",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "5",
  pages =        "c1--c1",
  month =        sep # "\slash " # oct,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Jan 20 08:55:34 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/05/msp20170500c1.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2017:ISPe,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Security \& Privacy}}}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "5",
  pages =        "c4--c4",
  month =        sep # "\slash " # oct,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Jan 20 08:55:34 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/05/msp20170500c4.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2017:NMOe,
  author =       "Anonymous",
  title =        "New Membership Options for a Better Fit",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "5",
  pages =        "c3--c3",
  month =        sep # "\slash " # oct,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Jan 20 08:55:34 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/05/msp20170500c3.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2017:TCf,
  author =       "Anonymous",
  title =        "Table of Contents",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "6",
  pages =        "1--2",
  month =        nov # "\slash " # dec,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Jan 20 08:55:34 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/06/msp2017060001.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2017:SAC,
  author =       "Anonymous",
  title =        "Security Advice That Can Be Followed",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "6",
  pages =        "3--5",
  month =        nov # "\slash " # dec,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Jan 20 08:55:34 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/06/msp2017060003.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2017:Mg,
  author =       "Anonymous",
  title =        "Masthead",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "6",
  pages =        "6",
  month =        nov # "\slash " # dec,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Jan 20 08:55:34 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/06/msp2017060006.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{McGraw:2017:SBTf,
  author =       "Gary McGraw",
  title =        "{Silver Bullet} Talks with {Nicole Perlroth}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "6",
  pages =        "7--9",
  month =        nov # "\slash " # dec,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Jan 20 08:55:34 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/06/msp2017060007.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Mazurczyk:2017:RAD,
  author =       "Wojciech Mazurczyk and Luca Caviglione and Steffen
                 Wendzel",
  title =        "Recent Advancements in Digital Forensics",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "6",
  pages =        "10--11",
  month =        nov # "\slash " # dec,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Jan 20 08:55:34 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/06/msp2017060010.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2017:FDF,
  author =       "Anonymous",
  title =        "The Future of Digital Forensics: Challenges and the
                 Road Ahead",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "6",
  pages =        "12--17",
  month =        nov # "\slash " # dec,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2017.4251117",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Jan 20 08:55:34 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/06/msp2017060012-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2017:PLC,
  author =       "Anonymous",
  title =        "Programmable Logic Controller Forensics",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "6",
  pages =        "18--24",
  month =        nov # "\slash " # dec,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2017.4251102",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Jan 20 08:55:34 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/06/msp2017060018-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2017:BFA,
  author =       "Anonymous",
  title =        "Botnet Fingerprinting: Anomaly Detection in {SMTP}
                 Conversations",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "6",
  pages =        "25--32",
  month =        nov # "\slash " # dec,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Jan 20 08:55:34 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/06/msp2017060025.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2017:PPF,
  author =       "Anonymous",
  title =        "{PROFORMA}: Proactive Forensics with Message
                 Analytics",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "6",
  pages =        "33--41",
  month =        nov # "\slash " # dec,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2017.4251112",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Jan 20 08:55:34 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/06/msp2017060033-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2017:MFA,
  author =       "Anonymous",
  title =        "Mobile Forensics: Advances, Challenges, and Research
                 Opportunities",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "6",
  pages =        "42--51",
  month =        nov # "\slash " # dec,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2017.4251107",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Jan 20 08:55:34 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/06/msp2017060042-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2017:EES,
  author =       "Anonymous",
  title =        "An Exploration of the Effects of Sensory Stimuli on
                 the Completion of Security Tasks",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "6",
  pages =        "52--60",
  month =        nov # "\slash " # dec,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2017.4251110",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Jan 20 08:55:34 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/06/msp2017060052-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2017:FSC,
  author =       "Anonymous",
  title =        "Faster Secure Cloud Computations with a Trusted
                 Proxy",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "6",
  pages =        "61--67",
  month =        nov # "\slash " # dec,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2017.4251121",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Jan 20 08:55:34 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/06/msp2017060061-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2017:DEU,
  author =       "Anonymous",
  title =        "Decision and Experienced Utility: Computational
                 Applications in Privacy Decision Making",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "6",
  pages =        "68--72",
  month =        nov # "\slash " # dec,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2017.4251104",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Jan 20 08:55:34 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/06/msp2017060068-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2017:LMI,
  author =       "Anonymous",
  title =        "The Last Mile for {IoT} Privacy",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "6",
  pages =        "73--76",
  month =        nov # "\slash " # dec,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2017.4251118",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Jan 20 08:55:34 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/06/msp2017060073-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2017:SBC,
  author =       "Anonymous",
  title =        "Securing Binary Code",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "6",
  pages =        "77--81",
  month =        nov # "\slash " # dec,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2017.4251105",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Jan 20 08:55:34 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/06/msp2017060077-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2017:NFM,
  author =       "Anonymous",
  title =        "{NAND} Flash Memory Forensic Analysis and the Growing
                 Challenge of Bit Errors",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "6",
  pages =        "82--87",
  month =        nov # "\slash " # dec,
  year =         "2017",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2017.4251114",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Jan 20 08:55:34 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/06/msp2017060082-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Bellovin:2017:WY,
  author =       "Steven M. Bellovin",
  title =        "Who Are You?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "6",
  pages =        "88",
  month =        nov # "\slash " # dec,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Jan 20 08:55:34 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/06/msp2017060088.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2017:CPSg,
  author =       "Anonymous",
  title =        "Call for Papers Special Issue on Security and Privacy
                 Research in {Brazil}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "6",
  pages =        "c2--c2",
  month =        nov # "\slash " # dec,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Jan 20 08:55:34 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/06/msp20170600c2.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2017:FCf,
  author =       "Anonymous",
  title =        "Front Cover",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "6",
  pages =        "c1--c1",
  month =        nov # "\slash " # dec,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Jan 20 08:55:34 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/06/msp20170600c1.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2017:GF,
  author =       "Anonymous",
  title =        "Got flaws?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "6",
  pages =        "c4--c4",
  month =        nov # "\slash " # dec,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Jan 20 08:55:34 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/06/msp20170600c4.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2017:SBS,
  author =       "Anonymous",
  title =        "{{\#SP18}} is back in {San Francisco}!",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "15",
  number =       "6",
  pages =        "c3--c3",
  month =        nov # "\slash " # dec,
  year =         "2017",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Sat Jan 20 08:55:34 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2017/06/msp20170600c3.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2018:TCa,
  author =       "Anonymous",
  title =        "Table of Contents",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "1",
  pages =        "1--2",
  month =        jan # "\slash " # feb,
  year =         "2018",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 16 07:55:13 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2018/01/msp2018010001.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2018:RT,
  author =       "Anonymous",
  title =        "Reviewer Thanks",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "1",
  pages =        "3--4",
  month =        jan # "\slash " # feb,
  year =         "2018",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 16 07:55:13 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2018/01/msp2018010003.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2018:Ma,
  author =       "Anonymous",
  title =        "Masthead",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "1",
  pages =        "5",
  month =        jan # "\slash " # feb,
  year =         "2018",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 16 07:55:13 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2018/01/msp2018010005.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{McGraw:2018:SBTa,
  author =       "Gary McGraw",
  title =        "{Silver Bullet} Talks with {Wafaa Mamilli}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "1",
  pages =        "6--9",
  month =        jan # "\slash " # feb,
  year =         "2018",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 16 07:55:13 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2018/01/msp2018010006.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Benzel:2018:SPI,
  author =       "Terry Benzel and Sean Peisert",
  title =        "Selected Papers from the {2017 IEEE Symposium on
                 Security and Privacy}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "1",
  pages =        "10--11",
  month =        jan # "\slash " # feb,
  year =         "2018",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 16 07:55:13 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2018/01/msp2018010010.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Herley:2018:SSC,
  author =       "Cormac Herley and P. C. van Oorschot",
  title =        "Science of Security: Combining Theory and Measurement
                 to Reflect the Observable",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "1",
  pages =        "12--22",
  month =        jan # "\slash " # feb,
  year =         "2018",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 16 07:55:13 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2018/01/msp2018010012.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2018:CPY,
  author =       "Anonymous",
  title =        "Cross-pollinate your ideas",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "1",
  pages =        "23",
  month =        jan # "\slash " # feb,
  year =         "2018",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 16 07:55:13 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2018/01/msp2018010023.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Pearce:2018:TCM,
  author =       "Paul Pearce and Roya Ensafi and Frank Li and Nick
                 Feamster and Vern Paxson",
  title =        "Toward Continual Measurement of Global Network-Level
                 Censorship",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "1",
  pages =        "24--33",
  month =        jan # "\slash " # feb,
  year =         "2018",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 16 07:55:13 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2018/01/msp2018010024.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Lecuyer:2018:ESB,
  author =       "Mathias Lecuyer and Riley Spahn and Roxana Geambasu
                 and Tzu-Kuo Huang and Siddhartha Sen",
  title =        "Enhancing Selectivity in Big Data",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "1",
  pages =        "34--42",
  month =        jan # "\slash " # feb,
  year =         "2018",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 16 07:55:13 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2018/01/msp2018010034.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2018:C,
  author =       "Anonymous",
  title =        "{COMPSAC 2018}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "1",
  pages =        "43",
  month =        jan # "\slash " # feb,
  year =         "2018",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 16 07:55:13 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2018/01/msp2018010043.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Lebeck:2018:AOS,
  author =       "Kiron Lebeck and Kimberly Ruth and Tadayoshi Kohno and
                 Franziska Roesner",
  title =        "{Arya}: Operating System Support for Securely
                 Augmenting Reality",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "1",
  pages =        "44--53",
  month =        jan # "\slash " # feb,
  year =         "2018",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 16 07:55:13 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2018/01/msp2018010044.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Ronen:2018:IGN,
  author =       "Eyal Ronen and Adi Shamir and Achi-Or Weingarten and
                 Colin OFlynn",
  title =        "{IoT} Goes Nuclear: Creating a {Zigbee} Chain
                 Reaction",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "1",
  pages =        "54--62",
  month =        jan # "\slash " # feb,
  year =         "2018",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 16 07:55:13 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2018/01/msp2018010054.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2018:ITSa,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Transactions on Sustainable
                 Computing}}}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "1",
  pages =        "63",
  month =        jan # "\slash " # feb,
  year =         "2018",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 16 07:55:13 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2018/01/msp2018010063.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Wijesekera:2018:DRM,
  author =       "Primal Wijesekera and Arjun Baokar and Lynn Tsai and
                 Joel Reardon and Serge Egelman and David Wagner and
                 Konstantin Beznosov",
  title =        "Dynamically Regulating Mobile Application
                 Permissions",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "1",
  pages =        "64--71",
  month =        jan # "\slash " # feb,
  year =         "2018",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 16 07:55:13 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2018/01/msp2018010064.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Hao:2018:VCV,
  author =       "Feng Hao and Dylan Clarke and Brian Randell and Siamak
                 F. Shahandashti",
  title =        "Verifiable Classroom Voting in Practice",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "1",
  pages =        "72--81",
  month =        jan # "\slash " # feb,
  year =         "2018",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 16 07:55:13 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2018/01/msp2018010072.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Hofstede:2018:FBC,
  author =       "Rick Hofstede and Aiko Pras and Anna Sperotto and Gabi
                 Dreo Rodosek",
  title =        "Flow-Based Compromise Detection: Lessons Learned",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "1",
  pages =        "82--89",
  month =        jan # "\slash " # feb,
  year =         "2018",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 16 07:55:13 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2018/01/msp2018010082.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2018:Mb,
  author =       "Anonymous",
  title =        "{myCS}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "1",
  pages =        "90",
  month =        jan # "\slash " # feb,
  year =         "2018",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 16 07:55:13 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2018/01/msp2018010090.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2018:PC,
  author =       "Anonymous",
  title =        "Prepare to Connect",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "1",
  pages =        "91",
  month =        jan # "\slash " # feb,
  year =         "2018",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 16 07:55:13 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2018/01/msp2018010091.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Albanese:2018:DSB,
  author =       "Massimiliano Albanese and Sushil Jajodia and Sridhar
                 Venkatesan",
  title =        "Defending from Stealthy Botnets Using Moving Target
                 Defenses",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "1",
  pages =        "92--97",
  month =        jan # "\slash " # feb,
  year =         "2018",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 16 07:55:13 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2018/01/msp2018010092.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Kaza:2018:HWC,
  author =       "Siddharth Kaza and Blair Taylor and Kyle Sherbert",
  title =        "Hello, World! --- Code Responsibly",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "1",
  pages =        "98--100",
  month =        jan # "\slash " # feb,
  year =         "2018",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 16 07:55:13 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2018/01/msp2018010098.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2018:ICSa,
  author =       "Anonymous",
  title =        "{IEEE Computer Society}: Be at the Center of It All",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "1",
  pages =        "101",
  month =        jan # "\slash " # feb,
  year =         "2018",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 16 07:55:13 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2018/01/msp2018010101.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Connolly:2018:FE,
  author =       "Aisling Connolly",
  title =        "Freedom of Encryption",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "1",
  pages =        "102--103",
  month =        jan # "\slash " # feb,
  year =         "2018",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 16 07:55:13 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2018/01/msp2018010102.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Geer:2018:TP,
  author =       "Daniel E. Geer",
  title =        "Trading Places",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "1",
  pages =        "104",
  month =        jan # "\slash " # feb,
  year =         "2018",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 16 07:55:13 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2018/01/msp2018010104.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2018:FCa,
  author =       "Anonymous",
  title =        "Front Cover",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "1",
  pages =        "c1--c1",
  month =        jan # "\slash " # feb,
  year =         "2018",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 16 07:55:13 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2018/01/msp20180100c1.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2018:ICSb,
  author =       "Anonymous",
  title =        "{IEEE Computer Society}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "1",
  pages =        "c3--c3",
  month =        jan # "\slash " # feb,
  year =         "2018",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 16 07:55:13 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2018/01/msp20180100c3.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2018:SBS,
  author =       "Anonymous",
  title =        "{SP18} is back in {San Francisco}!",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "1",
  pages =        "c2--c2",
  month =        jan # "\slash " # feb,
  year =         "2018",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 16 07:55:13 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2018/01/msp20180100c2.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2018:TCL,
  author =       "Anonymous",
  title =        "Take the {CS Library} wherever you go!",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "1",
  pages =        "c4--c4",
  month =        jan # "\slash " # feb,
  year =         "2018",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 16 07:55:13 MST 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2018/01/msp20180100c4.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2018:TCb,
  author =       "Anonymous",
  title =        "Table of contents",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "2",
  pages =        "1--2",
  month =        mar # "\slash " # apr,
  year =         "2018",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Apr 20 07:36:42 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2018/02/msp2018020001.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2018:INE,
  author =       "Anonymous",
  title =        "Introduction from the New {EIC}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "2",
  pages =        "3--4",
  month =        mar # "\slash " # apr,
  year =         "2018",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Apr 20 07:36:42 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2018/02/msp2018020003.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2018:Mc,
  author =       "Anonymous",
  title =        "Masthead",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "2",
  pages =        "5",
  month =        mar # "\slash " # apr,
  year =         "2018",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Apr 20 07:36:42 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2018/02/msp2018020005.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{McGraw:2018:SBTb,
  author =       "Gary McGraw",
  title =        "{Silver Bullet} Talks with {Craig Froelich}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "2",
  pages =        "6--8",
  month =        mar # "\slash " # apr,
  year =         "2018",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Apr 20 07:36:42 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2018/02/msp2018020006.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2018:ICSc,
  author =       "Anonymous",
  title =        "{IEEE Computer Society}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "2",
  pages =        "9",
  month =        mar # "\slash " # apr,
  year =         "2018",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Apr 20 07:36:42 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2018/02/msp2018020009.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Vidas:2018:CGS,
  author =       "Timothy Vidas and Per Larsen and Hamed Okhravi and
                 Ahmad-Reza Sadeghi",
  title =        "Changing the Game of Software Security",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "2",
  pages =        "10--11",
  month =        mar # "\slash " # apr,
  year =         "2018",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Apr 20 07:36:42 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2018/02/msp2018020010.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Shoshitaishvili:2018:MPR,
  author =       "Yan Shoshitaishvili and Antonio Bianchi and Kevin
                 Borgolte and Amat Cama and Jacopo Corbetta and
                 Francesco Disperati and Audrey Dutcher and John Grosen
                 and Paul Grosen and Aravind Machiry and Chris Salls and
                 Nick Stephens and Ruoyu Wang and Giovanni Vigna",
  title =        "Mechanical Phish: Resilient Autonomous Hacking",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "2",
  pages =        "12--22",
  month =        mar # "\slash " # apr,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2018.1870858",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Apr 20 07:36:42 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2018/02/msp2018020012-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Price:2018:HRD,
  author =       "Benjamin Price and Michael Zhivich and Michael
                 Thompson and Chris Eagle",
  title =        "House Rules: Designing the Scoring Algorithm for Cyber
                 Grand Challenge",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "2",
  pages =        "23--31",
  month =        mar # "\slash " # apr,
  year =         "2018",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Apr 20 07:36:42 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2018/02/msp2018020023.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Bryant:2018:HAC,
  author =       "Timothy Bryant and Shaun Davenport",
  title =        "A Honeybug for Automated Cyber Reasoning Systems",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "2",
  pages =        "32--36",
  month =        mar # "\slash " # apr,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2018.1870856",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Apr 20 07:36:42 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2018/02/msp2018020032-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Thompson:2018:EHC,
  author =       "Michael F. Thompson",
  title =        "Effects of a Honeypot on the Cyber Grand Challenge
                 Final Event",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "2",
  pages =        "37--41",
  month =        mar # "\slash " # apr,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2018.1870870",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Apr 20 07:36:42 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2018/02/msp2018020037-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Nguyen-Tuong:2018:XAC,
  author =       "Anh Nguyen-Tuong and David Melski and Jack W. Davidson
                 and Michele Co and William Hawkins and Jason D. Hiser
                 and Derek Morris and Ducson Nguyen and Eric Rizzi",
  title =        "{Xandra}: An Autonomous Cyber Battle System for the
                 Cyber Grand Challenge",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "2",
  pages =        "42--51",
  month =        mar # "\slash " # apr,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2018.1870876",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Apr 20 07:36:42 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2018/02/msp2018020042-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Avgerinos:2018:MCR,
  author =       "Thanassis Avgerinos and David Brumley and John Davis
                 and Ryan Goulden and Tyler Nighswander and Alex Rebert
                 and Ned Williamson",
  title =        "The {Mayhem} Cyber Reasoning System",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "2",
  pages =        "52--60",
  month =        mar # "\slash " # apr,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2018.1870873",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Apr 20 07:36:42 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2018/02/msp2018020052-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Goodman:2018:PPF,
  author =       "Peter Goodman and Artem Dinaburg",
  title =        "The Past, Present, and Future of {Cyberdyne}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "2",
  pages =        "61--69",
  month =        mar # "\slash " # apr,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2018.1870859",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Apr 20 07:36:42 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2018/02/msp2018020061-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Blank:2018:PAR,
  author =       "Peter Blank and Sabrina Kirrane and Sarah
                 Spiekermann",
  title =        "Privacy-Aware Restricted Areas for Unmanned Aerial
                 Systems",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "2",
  pages =        "70--79",
  month =        mar # "\slash " # apr,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2018.1870868",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Apr 20 07:36:42 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2018/02/msp2018020070-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Wang:2018:CDO,
  author =       "Cliff Wang and Zhuo Lu",
  title =        "Cyber Deception: Overview and the Road Ahead",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "2",
  pages =        "80--85",
  month =        mar # "\slash " # apr,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2018.1870866",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Apr 20 07:36:42 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2018/02/msp2018020080-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Wisniewski:2018:PPA,
  author =       "Pamela Wisniewski",
  title =        "The Privacy Paradox of Adolescent Online Safety: A
                 Matter of Risk Prevention or Risk Resilience?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "2",
  pages =        "86--90",
  month =        mar # "\slash " # apr,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2018.1870874",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Apr 20 07:36:42 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2018/02/msp2018020086-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Thompson:2018:ICL,
  author =       "Michael F. Thompson and Cynthia E. Irvine",
  title =        "Individualizing Cybersecurity Lab Exercises with
                 Labtainers",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "2",
  pages =        "91--95",
  month =        mar # "\slash " # apr,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2018.1870862",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Apr 20 07:36:42 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2018/02/msp2018020091-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Schneier:2018:AIA,
  author =       "Bruce Schneier",
  title =        "Artificial Intelligence and the Attack\slash Defense
                 Balance",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "2",
  pages =        "96",
  month =        mar # "\slash " # apr,
  year =         "2018",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Apr 20 07:36:42 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2018/02/msp2018020096.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2018:FCb,
  author =       "Anonymous",
  title =        "Front Cover",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "2",
  pages =        "c1--c1",
  month =        mar # "\slash " # apr,
  year =         "2018",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Apr 20 07:36:42 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2018/02/msp20180200c1.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2018:ISPa,
  author =       "Anonymous",
  title =        "{IEEE Security \& Privacy}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "2",
  pages =        "c4--c4",
  month =        mar # "\slash " # apr,
  year =         "2018",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Apr 20 07:36:42 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2018/02/msp20180200c4.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2018:SCS,
  author =       "Anonymous",
  title =        "{Seymour Cray}, {Sidney Fernbach} \& {Ken Kennedy}
                 Awards",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "2",
  pages =        "c2--c2",
  month =        mar # "\slash " # apr,
  year =         "2018",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Apr 20 07:36:42 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2018/02/msp20180200c2.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2018:SGKa,
  author =       "Anonymous",
  title =        "Share the gift of knowledge: give your favorite
                 student a membership to the {IEEE Computer Society}!",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "2",
  pages =        "c3--c3",
  month =        mar # "\slash " # apr,
  year =         "2018",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Apr 20 07:36:42 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2018/02/msp20180200c3.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2018:TCc,
  author =       "Anonymous",
  title =        "Table of Contents",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "3",
  pages =        "1--2",
  month =        may # "\slash " # jun,
  year =         "2018",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 13 10:31:41 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2018/03/msp2018030001.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2018:HMT,
  author =       "Anonymous",
  title =        "How Many Is Too Many Candidates?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "3",
  pages =        "3--5",
  month =        may # "\slash " # jun,
  year =         "2018",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 13 10:31:41 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2018/03/msp2018030003.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{McLean:2018:LE,
  author =       "John D. McLean and Cormac Herley and P. C. {Van
                 Oorschot}",
  title =        "Letter to the {Editor}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "3",
  pages =        "6--10",
  month =        may # "\slash " # jun,
  year =         "2018",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 13 10:31:41 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2018/03/msp2018030006.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2018:Md,
  author =       "Anonymous",
  title =        "Masthead",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "3",
  pages =        "11",
  month =        may # "\slash " # jun,
  year =         "2018",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 13 10:31:41 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2018/03/msp2018030011.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{McGraw:2018:SBTc,
  author =       "Gary McGraw",
  title =        "{Silver Bullet} Talks with {Bruce Potter}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "3",
  pages =        "12--14",
  month =        may # "\slash " # jun,
  year =         "2018",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 13 10:31:41 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2018/03/msp2018030012.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Tene:2018:FFH,
  author =       "Omer Tene and Jules Polonetsky and Ahmad-Reza
                 Sadeghi",
  title =        "Five Freedoms for the {Homo Deus}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "3",
  pages =        "15--17",
  month =        may # "\slash " # jun,
  year =         "2018",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 13 10:31:41 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2018/03/msp2018030015.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Sloan:2018:WAT,
  author =       "Robert H. Sloan and Richard Warner",
  title =        "When Is an Algorithm Transparent? {Predictive}
                 Analytics, Privacy, and Public Policy",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "3",
  pages =        "18--25",
  month =        may # "\slash " # jun,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2018.2701166",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 13 10:31:41 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2018/03/msp2018030018-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Stahl:2018:EPA,
  author =       "Bernd Carsten Stahl and David Wright",
  title =        "Ethics and Privacy in {AI} and Big Data: Implementing
                 Responsible Research and Innovation",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "3",
  pages =        "26--33",
  month =        may # "\slash " # jun,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2018.2701164",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 13 10:31:41 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2018/03/msp2018030026-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Altman:2018:HRF,
  author =       "Micah Altman and Alexandra Wood and Effy Vayena",
  title =        "A Harm-Reduction Framework for Algorithmic Fairness",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "3",
  pages =        "34--45",
  month =        may # "\slash " # jun,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2018.2701149",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 13 10:31:41 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2018/03/msp2018030034-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Edwards:2018:EAR,
  author =       "Lilian Edwards and Michael Veale",
  title =        "Enslaving the Algorithm: From a {``Right} to an
                 Explanation'' to a {``Right} to Better Decisions''?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "3",
  pages =        "46--54",
  month =        may # "\slash " # jun,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2018.2701152",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 13 10:31:41 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2018/03/msp2018030046-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2018:ICSd,
  author =       "Anonymous",
  title =        "{IEEE Computer Society}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "3",
  pages =        "55",
  month =        may # "\slash " # jun,
  year =         "2018",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 13 10:31:41 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2018/03/msp2018030055.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Schrader:2018:PPA,
  author =       "Dawn E. Schrader and Dipayan Ghosh",
  title =        "Proactively Protecting Against the Singularity:
                 Ethical Decision Making in {AI}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "3",
  pages =        "56--63",
  month =        may # "\slash " # jun,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2018.2701169",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 13 10:31:41 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2018/03/msp2018030056-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Jones:2018:AEA,
  author =       "Meg Leta Jones and Ellen Kaufman and Elizabeth
                 Edenberg",
  title =        "{AI} and the Ethics of Automating Consent",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "3",
  pages =        "64--72",
  month =        may # "\slash " # jun,
  year =         "2018",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 13 10:31:41 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2018/03/msp2018030064.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Binns:2018:WCP,
  author =       "Reuben Binns",
  title =        "What Can Political Philosophy Teach Us about
                 Algorithmic Fairness?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "3",
  pages =        "73--80",
  month =        may # "\slash " # jun,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2018.2701147",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 13 10:31:41 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2018/03/msp2018030073-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Liu:2018:TFC,
  author =       "Jian Liu and Wenting Li and Ghassan O. Karame and N.
                 Asokan",
  title =        "Toward Fairness of Cryptocurrency Payments",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "3",
  pages =        "81--89",
  month =        may # "\slash " # jun,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2018.2701163",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 13 10:31:41 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2018/03/msp2018030081-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Franz:2018:MMP,
  author =       "Michael Franz",
  title =        "Making Multivariant Programming Practical and
                 Inexpensive",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "3",
  pages =        "90--94",
  month =        may # "\slash " # jun,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2018.2701161",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 13 10:31:41 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2018/03/msp2018030090-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2018:CSE,
  author =       "Anonymous",
  title =        "Computing in Science \& Engineering",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "3",
  pages =        "95",
  month =        may # "\slash " # jun,
  year =         "2018",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 13 10:31:41 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2018/03/msp2018030095.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Rashid:2018:SCS,
  author =       "Awais Rashid and George Danezis and Howard Chivers and
                 Emil Lupu and Andrew Martin and Makayla Lewis and
                 Claudia Peersman",
  title =        "Scoping the Cyber Security Body of Knowledge",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "3",
  pages =        "96--102",
  month =        may # "\slash " # jun,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2018.2701150",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 13 10:31:41 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2018/03/msp2018030096-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Kharraz:2018:PAR,
  author =       "Amin Kharraz and William Robertson and Engin Kirda",
  title =        "Protecting against Ransomware: A New Line of Research
                 or Restating Classic Ideas?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "3",
  pages =        "103--107",
  month =        may # "\slash " # jun,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2018.2701165",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 13 10:31:41 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2018/03/msp2018030103-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Bellovin:2018:TNC,
  author =       "Steven M. Bellovin",
  title =        "Toward a National Cybersecurity Policy",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "3",
  pages =        "108",
  month =        may # "\slash " # jun,
  year =         "2018",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 13 10:31:41 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2018/03/msp2018030108.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2018:CI,
  author =       "Anonymous",
  title =        "Connect on Interface",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "3",
  pages =        "c2--c2",
  month =        may # "\slash " # jun,
  year =         "2018",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 13 10:31:41 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2018/03/msp20180300c2.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2018:FCc,
  author =       "Anonymous",
  title =        "Front Cover",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "3",
  pages =        "c1--c1",
  month =        may # "\slash " # jun,
  year =         "2018",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 13 10:31:41 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2018/03/msp20180300c1.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2018:ISPb,
  author =       "Anonymous",
  title =        "{IEEE Security \& Privacy}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "3",
  pages =        "c4--c4",
  month =        may # "\slash " # jun,
  year =         "2018",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 13 10:31:41 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2018/03/msp20180300c4.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2018:OMU,
  author =       "Anonymous",
  title =        "One membership. {Unlimited} knowledge",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "3",
  pages =        "c3--c3",
  month =        may # "\slash " # jun,
  year =         "2018",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 13 10:31:41 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2018/03/msp20180300c3.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2018:TCd,
  author =       "Anonymous",
  title =        "Table of Contents",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "4",
  pages =        "1--2",
  month =        jul # "\slash " # aug,
  year =         "2018",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 13 10:31:41 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2018/04/msp2018040001.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2018:EDS,
  author =       "Anonymous",
  title =        "Encouraging Diversity in Security and Privacy
                 Research",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "4",
  pages =        "3--5",
  month =        jul # "\slash " # aug,
  year =         "2018",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 13 10:31:41 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2018/04/msp2018040003.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2018:Me,
  author =       "Anonymous",
  title =        "Masthead",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "4",
  pages =        "6",
  month =        jul # "\slash " # aug,
  year =         "2018",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 13 10:31:41 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2018/04/msp2018040006.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{McGraw:2018:SBTd,
  author =       "Gary McGraw",
  title =        "{Silver Bullet} Talks with {Nick Weaver}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "4",
  pages =        "7--10",
  month =        jul # "\slash " # aug,
  year =         "2018",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 13 10:31:41 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2018/04/msp2018040007.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  remark =       "Security researcher Nick Weaver provides excellent,
                 well-informed, and thoughtful commentary on
                 cryptocurrencies, distributed ledgers, and currency
                 transaction algorithms.",
}

@Article{Karame:2018:BSP,
  author =       "Ghassan Karame and Srdjan Capkun",
  title =        "Blockchain Security and Privacy",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "4",
  pages =        "11--12",
  month =        jul # "\slash " # aug,
  year =         "2018",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 13 10:31:41 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2018/04/msp2018040011.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Meiklejohn:2018:TTO,
  author =       "Sarah Meiklejohn",
  title =        "Top Ten Obstacles along Distributed Ledgers Path to
                 Adoption",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "4",
  pages =        "13--19",
  month =        jul # "\slash " # aug,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2018.3111235",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 13 10:31:41 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2018/04/msp2018040013-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Dunphy:2018:FLI,
  author =       "Paul Dunphy and Fabien A. P. Petitcolas",
  title =        "A First Look at Identity Management Schemes on the
                 Blockchain",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "4",
  pages =        "20--29",
  month =        jul # "\slash " # aug,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2018.3111247",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 13 10:31:41 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2018/04/msp2018040020-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Chen:2018:TMI,
  author =       "Lin Chen and Lei Xu and Zhimin Gao and Yang Lu and
                 Weidong Shi",
  title =        "Tyranny of the Majority: On the {(Im)possibility} of
                 Correctness of Smart Contracts",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "4",
  pages =        "30--37",
  month =        jul # "\slash " # aug,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2018.3111240",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 13 10:31:41 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2018/04/msp2018040030-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Henry:2018:BAP,
  author =       "Ryan Henry and Amir Herzberg and Aniket Kate",
  title =        "Blockchain Access Privacy: Challenges and Directions",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "4",
  pages =        "38--45",
  month =        jul # "\slash " # aug,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2018.3111245",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 13 10:31:41 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2018/04/msp2018040038-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Giechaskiel:2018:WCC,
  author =       "Ilias Giechaskiel and Cas Cremers and Kasper B.
                 Rasmussen",
  title =        "When the Crypto in Cryptocurrencies Breaks: {Bitcoin}
                 Security under Broken Primitives",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "4",
  pages =        "46--56",
  month =        jul # "\slash " # aug,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2018.3111253",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 13 10:31:41 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2018/04/msp2018040046-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{ElBansarkhani:2018:PSD,
  author =       "Rachid {El Bansarkhani} and Matthias Geihs and
                 Johannes Buchmann",
  title =        "{PQChain}: Strategic Design Decisions for Distributed
                 Ledger Technologies against Future Threats",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "4",
  pages =        "57--65",
  month =        jul # "\slash " # aug,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2018.3111246",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 13 10:31:41 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2018/04/msp2018040057-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Perrotta:2018:BBU,
  author =       "Raffaello Perrotta and Feng Hao",
  title =        "Botnet in the Browser: Understanding Threats Caused by
                 Malicious Browser Extensions",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "4",
  pages =        "66--81",
  month =        jul # "\slash " # aug,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2018.3111249",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 13 10:31:41 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2018/04/msp2018040066-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Wang:2018:ISP,
  author =       "Yang Wang",
  title =        "Inclusive Security and Privacy",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "4",
  pages =        "82--87",
  month =        jul # "\slash " # aug,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2018.3111237",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 13 10:31:41 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2018/04/msp2018040082-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Ahmed:2018:PIT,
  author =       "Irfan Ahmed and Vassil Roussev",
  title =        "Peer Instruction Teaching Methodology for
                 Cybersecurity Education",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "4",
  pages =        "88--91",
  month =        jul # "\slash " # aug,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2018.3111242",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 13 10:31:41 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2018/04/msp2018040088-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Tziakouris:2018:CFC,
  author =       "Giannis Tziakouris",
  title =        "Cryptocurrencies --- A Forensic Challenge or
                 Opportunity for Law Enforcement? {An} {INTERPOL}
                 Perspective",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "4",
  pages =        "92--94",
  month =        jul # "\slash " # aug,
  year =         "2018",
  CODEN =        "????",
  DOI =          "https://doi.org/10.1109/MSP.2018.3111243",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 13 10:31:41 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2018/04/msp2018040092-abs.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2018:ICSe,
  author =       "Anonymous",
  title =        "{IEEE Computer Society} Information",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "4",
  pages =        "95",
  month =        jul # "\slash " # aug,
  year =         "2018",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 13 10:31:41 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2018/04/msp2018040095.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Geer:2018:YWY,
  author =       "Daniel E. Geer",
  title =        "You Are What You Eat",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "4",
  pages =        "96",
  month =        jul # "\slash " # aug,
  year =         "2018",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 13 10:31:41 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2018/04/msp2018040096.html",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2018:FCd,
  author =       "Anonymous",
  title =        "Front Cover",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "4",
  pages =        "c1--c1",
  month =        jul # "\slash " # aug,
  year =         "2018",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 13 10:31:41 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2018/04/msp20180400c1.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2018:ISPc,
  author =       "Anonymous",
  title =        "{IEEE Security \& Privacy}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "4",
  pages =        "c2--c2",
  month =        jul # "\slash " # aug,
  year =         "2018",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 13 10:31:41 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2018/04/msp20180400c2.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2018:SC,
  author =       "Anonymous",
  title =        "Stay Connected",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "4",
  pages =        "c4--c4",
  month =        jul # "\slash " # aug,
  year =         "2018",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 13 10:31:41 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2018/04/msp20180400c4.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2018:SGKb,
  author =       "Anonymous",
  title =        "Share The Gift Of Knowledge: Give Your Favorite
                 Student a Membership to the {IEEE Computer Society}!",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "4",
  pages =        "c3--c3",
  month =        jul # "\slash " # aug,
  year =         "2018",
  CODEN =        "????",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 13 10:31:41 MDT 2018",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  URL =          "https://www.computer.org/csdl/mags/sp/2018/04/msp20180400c3.pdf",
  acknowledgement = ack-nhfb,
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2018:FCe,
  author =       "Anonymous",
  title =        "Front Cover",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "5",
  pages =        "c1--c1",
  month =        sep # "\slash " # oct,
  year =         "2018",
  DOI =          "https://doi.org/10.1109/MSP.2018.3761707",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2018:ISPd,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Security \& Privacy}}} Special Issue
                 Call for Papers",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "5",
  pages =        "c2--c2",
  month =        sep # "\slash " # oct,
  year =         "2018",
  DOI =          "https://doi.org/10.1109/MSP.2018.3761708",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2018:TCe,
  author =       "Anonymous",
  title =        "Table of Contents",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "5",
  pages =        "1--2",
  month =        sep # "\slash " # oct,
  year =         "2018",
  DOI =          "https://doi.org/10.1109/MSP.2018.3761720",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2018:ITSb,
  author =       "Anonymous",
  title =        "{Internet of Things} Security: Is Anything New?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "5",
  pages =        "3--5",
  month =        sep # "\slash " # oct,
  year =         "2018",
  DOI =          "https://doi.org/10.1109/MSP.2018.3761715",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "From the Editors; Internet of Things; IoT; security",
}

@Article{Anonymous:2018:Mf,
  author =       "Anonymous",
  title =        "{[Masthead]}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "5",
  pages =        "6--6",
  month =        sep # "\slash " # oct,
  year =         "2018",
  DOI =          "https://doi.org/10.1109/MSP.2018.3761711",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{McGraw:2018:SBTe,
  author =       "G. McGraw",
  title =        "{Silver Bullet} Talks with {Tanya Janca}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "5",
  pages =        "7--11",
  month =        sep # "\slash " # oct,
  year =         "2018",
  DOI =          "https://doi.org/10.1109/MSP.2018.3761705",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "cloud; Cloud computing; interview; Interviews;
                 security; Silver Bullet; Software security",
}

@Article{Buchmann:2018:PCP,
  author =       "J. Buchmann and K. Lauter and M. Mosca",
  title =        "Postquantum Cryptography, Part 2",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "5",
  pages =        "12--13",
  month =        sep # "\slash " # oct,
  year =         "2018",
  DOI =          "https://doi.org/10.1109/MSP.2018.3761714",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "Computer networks; Computer security; Cryptography;
                 cryptography; postquantum cryptography; security; Shor;
                 Special issues and sections",
}

@Article{Jordan:2018:QCS,
  author =       "S. P. Jordan and Y. Liu",
  title =        "Quantum Cryptanalysis: {Shor}, {Grover}, and Beyond",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "5",
  pages =        "14--21",
  month =        sep # "\slash " # oct,
  year =         "2018",
  DOI =          "https://doi.org/10.1109/MSP.2018.3761719",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "algorithms; Computers; cryptanalysis; Elliptic curve
                 cryptography; Elliptic curves; Logic gates; postquantum
                 cryptography; Postquantum Cryptography Part 2; quantum
                 algorithms; quantum attack; Quantum computing; quantum
                 computing; quantum cryptanalysis; quantum cryptography;
                 security",
}

@Article{Roetteler:2018:QCC,
  author =       "M. Roetteler and K. M. Svore",
  title =        "Quantum Computing: Codebreaking and Beyond",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "5",
  pages =        "22--36",
  month =        sep # "\slash " # oct,
  year =         "2018",
  DOI =          "https://doi.org/10.1109/MSP.2018.3761710",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "AES; Computational modeling; Computer security;
                 cryptographic applications; cryptographic protocols;
                 Cryptography; cryptography; Logic gates; postquantum
                 cryptography; quantum algorithms; quantum computer;
                 quantum computing; Quantum computing; quantum
                 cryptanalysis; quantum cryptography; quantum mechanical
                 systems; quantum programming; quantum security
                 parameters; quantum simulation; quantum theory; RSA;
                 security; SHA; Training",
}

@Article{Anonymous:2018:ICSf,
  author =       "Anonymous",
  title =        "{IEEE Computer Society}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "5",
  pages =        "37--37",
  month =        sep # "\slash " # oct,
  year =         "2018",
  DOI =          "https://doi.org/10.1109/MSP.2018.3761725",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Mosca:2018:CEQ,
  author =       "M. Mosca",
  title =        "Cybersecurity in an Era with Quantum Computers: Will
                 We Be Ready?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "5",
  pages =        "38--41",
  month =        sep # "\slash " # oct,
  year =         "2018",
  DOI =          "https://doi.org/10.1109/MSP.2018.3761723",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "Cryptography; cryptography; cybersecurity; Fault
                 tolerance; Fault tolerant systems; information assets;
                 migration time; organizations; quantum attacks; quantum
                 computers; quantum computing; Quantum computing; risk
                 management; security; security of data; security shelf
                 life; specific risks",
}

@Article{Sasaki:2018:QKD,
  author =       "M. Sasaki",
  title =        "Quantum Key Distribution and Its Applications",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "5",
  pages =        "42--48",
  month =        sep # "\slash " # oct,
  year =         "2018",
  DOI =          "https://doi.org/10.1109/MSP.2018.3761713",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "Authentication; continental-scale QKD networks;
                 Encryption; one-time pad; postquantum cryptography;
                 Protocols; QKD; Quantum computing; quantum
                 cryptography; quantum key distribution; secret key;
                 Servers; telecommunication security; unlimited
                 computational ability",
}

@Article{Gu:2018:FCP,
  author =       "Q. Gu and D. Formby and S. Ji and H. Cam and R.
                 Beyah",
  title =        "Fingerprinting for Cyber-Physical System Security:
                 Device Physics Matters Too",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "5",
  pages =        "49--59",
  month =        sep # "\slash " # oct,
  year =         "2018",
  DOI =          "https://doi.org/10.1109/MSP.2018.3761722",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "actuators; Actuators; Computer security; critical
                 systems; Cyber-Physical System; cyber-physical system
                 security; Cyber-physical systems; device fingerprints;
                 device physics; device physics matters; Fingerprint
                 recognition; fingerprinting; Integrated circuits;
                 process actuators; security; security of data",
}

@Article{Kreutz:2018:KPS,
  author =       "D. Kreutz and J. Yu and P. Esteves-Ver{\'\i}ssimo and
                 C. Magalh{\~a}es and F. M. V. Ramos",
  title =        "The {KISS} Principle in Software-Defined Networking: A
                 Framework for Secure Communications",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "5",
  pages =        "60--70",
  month =        sep # "\slash " # oct,
  year =         "2018",
  DOI =          "https://doi.org/10.1109/MSP.2018.3761717",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "Authentication; Complexity theory; computer network
                 security; Control systems; cryptographic primitives;
                 Cryptography; integrated device verification value
                 iDVV; KISS principle; perfect forward secrecy;
                 performance; Performance evaluation; Protocols; SDN;
                 secure channel support; secure communications; secure
                 mechanisms; secure SDN control plane communications
                 architecture; security; software defined networking;
                 software-defined networking; support infrastructure;
                 system architecture; telecommunication traffic;
                 traditional solutions",
}

@Article{Anonymous:2018:IBA,
  author =       "Anonymous",
  title =        "Impact a broader audience",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "5",
  pages =        "71--71",
  month =        sep # "\slash " # oct,
  year =         "2018",
  DOI =          "https://doi.org/10.1109/MSP.2018.3761716",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Winkler:2018:PCD,
  author =       "S. Winkler and S. Zeadally and K. Evans",
  title =        "Privacy and Civilian Drone Use: The Need for Further
                 Regulation",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "5",
  pages =        "72--80",
  month =        sep # "\slash " # oct,
  year =         "2018",
  DOI =          "https://doi.org/10.1109/MSP.2018.3761721",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "Aircraft; Atmospheric modeling; autonomous aerial
                 vehicles; best practices; data privacy; drone use;
                 Drones; drones; explicit privacy protection; FAA;
                 Government policies; Guidelines; helicopters; law;
                 Military aircraft; mobile robots; National
                 Telecommunications and Information Association;
                 Privacy; privacy; privacy concerns; regulation NTIA;
                 social media; sophisticated audio/video; US
                 regulation",
}

@Article{Anonymous:2018:ITB,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Transactions on Big Data}}}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "5",
  pages =        "81--81",
  month =        sep # "\slash " # oct,
  year =         "2018",
  DOI =          "https://doi.org/10.1109/MSP.2018.3761706",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Stobert:2018:TAL,
  author =       "E. Stobert and E. Cavar and L. Malisa and D. Sommer",
  title =        "Teaching Authentication as a Life Skill",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "5",
  pages =        "82--85",
  month =        sep # "\slash " # oct,
  year =         "2018",
  DOI =          "https://doi.org/10.1109/MSP.2018.3761712",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "Authentication; authentication; authentication
                 teaching; computer aided instruction; computer science
                 education; daily living move; education; educational
                 courses; educational institutions; Fingerprint
                 recognition; integral life skill; message
                 authentication; Password; password security; security;
                 security curriculum modules; security management tasks;
                 Swiss high schoolers; Task analysis; teaching",
}

@Article{Schneier:2018:CAA,
  author =       "B. Schneier",
  title =        "Cryptography after the Aliens Land",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "5",
  pages =        "86--88",
  month =        sep # "\slash " # oct,
  year =         "2018",
  DOI =          "https://doi.org/10.1109/MSP.2018.3761724",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "cryptography; postquantum; quantum cryptography;
                 security",
}

@Article{Anonymous:2018:ILC,
  author =       "Anonymous",
  title =        "{IEEE} Letters of the {Computer Society}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "5",
  pages =        "c3--c3",
  month =        sep # "\slash " # oct,
  year =         "2018",
  DOI =          "https://doi.org/10.1109/MSP.2018.3761709",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2018:ISPe,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Security \& Privacy}}}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "5",
  pages =        "c4--c4",
  month =        sep # "\slash " # oct,
  year =         "2018",
  DOI =          "https://doi.org/10.1109/MSP.2018.3761718",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2018:FCf,
  author =       "Anonymous",
  title =        "Front Cover",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "6",
  pages =        "C1--C1",
  month =        nov # "\slash " # dec,
  year =         "2018",
  DOI =          "https://doi.org/10.1109/MSEC.2018.2882150",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2018:TCf,
  author =       "Anonymous",
  title =        "Table of Contents",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "6",
  pages =        "1--2",
  month =        nov # "\slash " # dec,
  year =         "2018",
  DOI =          "https://doi.org/10.1109/MSEC.2018.2882149",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2018:SL,
  author =       "Anonymous",
  title =        "Staff List",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "6",
  pages =        "3--3",
  month =        nov # "\slash " # dec,
  year =         "2018",
  DOI =          "https://doi.org/10.1109/MSEC.2018.2882151",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{McGraw:2018:SBTf,
  author =       "G. McGraw",
  title =        "{Silver Bullet} Talks With {Kathleen Fisher}
                 [Interview]",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "6",
  pages =        "4--9",
  month =        nov # "\slash " # dec,
  year =         "2018",
  DOI =          "https://doi.org/10.1109/MSEC.2018.2882152",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "Computer bugs; Computer hacking; Computer languages;
                 Interviews; Machine learning",
}

@Article{SeabraOliveira:2018:CPI,
  author =       "D. {Seabra Oliveira} and J. Epstein and J. Kurose and
                 A. Rocha",
  title =        "Cybersecurity and Privacy Issues in {Brazil}: Back,
                 Now, and Then [{Guest Editors}' Introduction]",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "6",
  pages =        "10--12",
  month =        nov # "\slash " # dec,
  year =         "2018",
  DOI =          "https://doi.org/10.1109/MSEC.2018.2874824",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "Collaboration; Computer security; Electronic voting;
                 Malware; Privacy; Security of data; Special issues and
                 sections",
}

@Article{Barcellos:2018:RSP,
  author =       "M. Barcellos and D. F. Aranha",
  title =        "Research in Security and Privacy in {Brazil}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "6",
  pages =        "14--21",
  month =        nov # "\slash " # dec,
  year =         "2018",
  DOI =          "https://doi.org/10.1109/MSEC.2018.2874855",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "Brazil; Communication networks; Cryptography; data
                 privacy; geographical distribution; Internet of Things;
                 Privacy; privacy; research areas.; security; Security
                 of data",
}

@Article{Aranha:2018:GBU,
  author =       "D. F. Aranha and J. {van de Graaf}",
  title =        "The Good, the Bad, and the Ugly: Two Decades of
                 E-Voting in {Brazil}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "6",
  pages =        "22--30",
  month =        nov # "\slash " # dec,
  year =         "2018",
  DOI =          "https://doi.org/10.1109/MSEC.2018.2875318",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "Brazil; E-voting; electronic voting; Electronic
                 voting; government data processing; organisational
                 aspects; Privacy; Security; Security of data; security
                 requirements; system organization; transparency
                 mechanisms",
}

@Article{Ceschin:2018:NSA,
  author =       "F. Ceschin and F. Pinage and M. Castilho and D.
                 Menotti and L. S. Oliveira and A. Gregio",
  title =        "The Need for Speed: An Analysis of {Brazilian} Malware
                 Classifiers",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "6",
  pages =        "31--41",
  month =        nov # "\slash " # dec,
  year =         "2018",
  DOI =          "https://doi.org/10.1109/MSEC.2018.2875369",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "Brazilian malware classifiers; Feature extraction;
                 invasive software; learning (artificial intelligence);
                 Machine learning; machine-learning systems; Malware;
                 malware classification; pattern classification;
                 Security; Security of data; Support vector machines",
}

@Article{Matias:2018:NNZ,
  author =       "P. Matias and P. Barbosa and T. N. C. Cardoso and D.
                 M. Campos and D. F. Aranha",
  title =        "{NIZKCTF}: A Noninteractive Zero-Knowledge
                 Capture-the-Flag Platform",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "6",
  pages =        "42--51",
  month =        nov # "\slash " # dec,
  year =         "2018",
  DOI =          "https://doi.org/10.1109/MSEC.2018.2875324",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "Brazilian cybersecurity community; Computer security;
                 cryptography; Cryptography; educational tools; NIZKCTF;
                 noninteractive zero-knowledge capture-the-flag
                 platform; open-audit CTF platform; Privacy;
                 professional tools; security issues; Servers; Software
                 development; zero-knowledge proofs",
}

@Article{Silva:2018:EBC,
  author =       "P. Silva and T. Basso and N. Antunes and R. Moraes and
                 M. Vieira and P. Simoes and E. Montiero",
  title =        "A {Europe--Brazil} Context for Secure Data Analytics
                 in the Cloud",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "6",
  pages =        "52--60",
  month =        nov # "\slash " # dec,
  year =         "2018",
  DOI =          "https://doi.org/10.1109/MSEC.2018.2875326",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "anonymization techniques; Big Data; Cloud computing;
                 cloud computing; data analysis; Data analysis; Data
                 privacy; data privacy; elastic AAA; Europe-Brazil
                 context; intercontinental data processing cloud
                 systems; legislation; legislation differences; Privacy;
                 privacy challenges; secure data analytics; security
                 assessment; Security of data; trusted computing;
                 trustworthiness estimation",
}

@Article{Kroll:2018:DSD,
  author =       "J. A. Kroll",
  title =        "Data Science Data Governance [{AI} Ethics]",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "6",
  pages =        "61--70",
  month =        nov # "\slash " # dec,
  year =         "2018",
  DOI =          "https://doi.org/10.1109/MSEC.2018.2875329",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "Best practices; Data privacy; Decision making; Ethics;
                 Machine learning; Privacy",
}

@Article{Sun:2018:TCC,
  author =       "X. Sun and P. Liu and A. Singhal",
  title =        "Toward Cyberresiliency in the Context of Cloud
                 Computing [Resilient Security]",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "6",
  pages =        "71--75",
  month =        nov # "\slash " # dec,
  year =         "2018",
  DOI =          "https://doi.org/10.1109/MSEC.2018.2882122",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "attack campaign; business data processing; business
                 processes; cloud computing; Cloud computing;
                 cyberresiliency; enterprise network; Measurement;
                 Resiliency; resilient security; security of data;
                 Security of data; Task analysis",
}

@Article{Anonymous:2018:ICSg,
  author =       "Anonymous",
  title =        "{IEEE Computer Society} information",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "6",
  pages =        "77--77",
  month =        nov # "\slash " # dec,
  year =         "2018",
  DOI =          "https://doi.org/10.1109/MSEC.2018.2885448",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Bellovin:2018:UCL,
  author =       "S. M. Bellovin",
  title =        "Unnoticed Consent [Last Word]",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "16",
  number =       "6",
  pages =        "80--79",
  month =        nov # "\slash " # dec,
  year =         "2018",
  DOI =          "https://doi.org/10.1109/MSEC.2018.2882121",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "Best practices; Data privacy; Data protection; General
                 Data Protection Regulation; Government policies;
                 Legislation; Privacy",
}

@Article{Anonymous:2019:FCa,
  author =       "Anonymous",
  title =        "Front Cover",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "1",
  pages =        "C1--C1",
  month =        jan # "\slash " # feb,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2897876",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2019:IESa,
  author =       "Anonymous",
  title =        "{4th IEEE European Symposium on Security and
                 Privacy}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "1",
  pages =        "C2--C2",
  month =        jan # "\slash " # feb,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2900875",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2019:TCa,
  author =       "Anonymous",
  title =        "Table of Contents",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "1",
  pages =        "1--2",
  month =        jan # "\slash " # feb,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2018.2875849",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2019:Ma,
  author =       "Anonymous",
  title =        "Masthead",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "1",
  pages =        "3--3",
  month =        jan # "\slash " # feb,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2018.2875850",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Schneck:2019:CCN,
  author =       "P. A. Schneck",
  title =        "Cybersecurity Compliance Is Necessary but Not
                 Sufficient: Bad Guys Don't Follow Laws",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "1",
  pages =        "4--6",
  month =        jan # "\slash " # feb,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2897041",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2019:RSa,
  author =       "Anonymous",
  title =        "{Reliability Society}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "1",
  pages =        "6--6",
  month =        jan # "\slash " # feb,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2906972",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Mazurczyk:2019:RAD,
  author =       "W. Mazurczyk and L. Caviglione and S. Wendzel",
  title =        "Recent Advancements in Digital Forensics, Part 2",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "1",
  pages =        "7--8",
  month =        jan # "\slash " # feb,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2896857",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "Computer security; Digital forensics; Forensics; Law
                 enforcement; Special issues and sections",
}

@Article{Anonymous:2019:ITBa,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Transactions on Big Data}}}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "1",
  pages =        "8--8",
  month =        jan # "\slash " # feb,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2900869",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2019:ICSa,
  author =       "Anonymous",
  title =        "{IEEE Computer Society} Information",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "1",
  pages =        "9--9",
  month =        jan # "\slash " # feb,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2018.2885449",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Tian:2019:PAT,
  author =       "H. Tian and Y. Chen and H. Jiang and Y. Huang and F.
                 Nan and Y. Chen",
  title =        "Public Auditing for Trusted Cloud Storage Services",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "1",
  pages =        "10--22",
  month =        jan # "\slash " # feb,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2018.2875880",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "auditing; cloud computing; Cloud computing; cloud
                 service providers; Data privacy; Data processing; data
                 security; data services; Digital forensics; legal
                 expectations; on-demand outsourcing; Outsourcing;
                 outsourcing; public data auditing; Security; security
                 of data; Servers; storage management; trusted cloud
                 storage services",
}

@Article{Anonymous:2019:ITSa,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Transactions on Sustainable
                 Computing}}}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "1",
  pages =        "22--22",
  month =        jan # "\slash " # feb,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2900871",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Axenopoulos:2019:FLS,
  author =       "A. Axenopoulos and V. Eiselein and A. Penta and E.
                 Koblents and E. {La Mattina} and P. Daras",
  title =        "A Framework for Large-Scale Analysis of Video ``in the
                 Wild'' to Assist Digital Forensic Examination",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "1",
  pages =        "23--33",
  month =        jan # "\slash " # feb,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2018.2875851",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "Biometrics (access control); Detectors; digital
                 forensic examination; digital forensics; Digital
                 forensics; European Union-funded project LASIE; event
                 detection; Feature extraction; forensics investigators;
                 image analysis; learning (artificial intelligence);
                 machine learning; Object detection; object detection;
                 object tracking; video analysis; video signal
                 processing; Visualization",
}

@Article{Anonymous:2019:ISPa,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Security \& Privacy}}} Subscribe",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "1",
  pages =        "33--33",
  month =        jan # "\slash " # feb,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2900868",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Ricci:2019:BBD,
  author =       "J. Ricci and I. Baggili and F. Breitinger",
  title =        "Blockchain-Based Distributed Cloud Storage Digital
                 Forensics: Where's the Beef?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "1",
  pages =        "34--42",
  month =        jan # "\slash " # feb,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2018.2875877",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "Bitcoin; Blockchain; blockchain; cloud computing;
                 Cloud computing; cloud storage; data acquisition;
                 Digital forensics; digital forensics; digital storage;
                 distributed cloud storage digital forensics;
                 distributed databases; storage management",
}

@Article{Carvalho:2019:IMC,
  author =       "R. Carvalho and M. Goldsmith and S. Creese",
  title =        "Investigating Malware Campaigns With Semantic
                 Technologies",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "1",
  pages =        "43--54",
  month =        jan # "\slash " # feb,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2018.2875878",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "computer crime; Computer crime; cybercrime; Digital
                 forensics; human reasoning skills; invasive software;
                 Malware; malware ecosystem; malware-campaign
                 investigation; Ontologies; semantic technologies;
                 Semantic technology; Task analysis; Triples (Data
                 structure)",
}

@Article{Anonymous:2019:ICSb,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE CG\&A}}} Subscribe",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "1",
  pages =        "54--54",
  month =        jan # "\slash " # feb,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2900873",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Al-HajBaddar:2019:BAD,
  author =       "S. {Al-Haj Baddar} and A. Merlo and M. Migliardi",
  title =        "Behavioral-Anomaly Detection in Forensics Analysis",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "1",
  pages =        "55--62",
  month =        jan # "\slash " # feb,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2894917",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "behavioral-anomaly detection; computer crime; Computer
                 crime; cybercrimes; data privacy; Digital forensics;
                 digital forensics; forensics activities; lightweight
                 forensics tools; Privacy; Real-time systems;
                 Reliability; user privacy rights",
}

@Article{Maiorca:2019:DIP,
  author =       "D. Maiorca and B. Biggio",
  title =        "Digital Investigation of {PDF} Files: Unveiling Traces
                 of Embedded Malware",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "1",
  pages =        "63--71",
  month =        jan # "\slash " # feb,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2018.2875879",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "attack techniques; cybersecurity landscape; digital
                 forensic investigations; digital forensics; Digital
                 forensics; Document handling; embedded malware;
                 Internet; invasive software; Malware; PDF files; PDF
                 malware; Portable document format; Publishing",
}

@Article{Anonymous:2019:IPCa,
  author =       "Anonymous",
  title =        "{{\booktitle{IT Professional}}} Call for Articles",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "1",
  pages =        "71--71",
  month =        jan # "\slash " # feb,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2900874",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Sherman:2019:OVB,
  author =       "A. T. Sherman and F. Javani and H. Zhang and E.
                 Golaszewski",
  title =        "On the Origins and Variations of Blockchain
                 Technologies",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "1",
  pages =        "72--77",
  month =        jan # "\slash " # feb,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2893730",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "Bitcoin; Blockchain; blockchain technologies;
                 blockchain variation; Computer security; cryptography;
                 Fault tolerant systems; financial data processing;
                 Smart contracts",
}

@Article{Anonymous:2019:IPCb,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Pervasive Computing}}} Call for
                 Articles",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "1",
  pages =        "77--77",
  month =        jan # "\slash " # feb,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2900896",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Payer:2019:FHT,
  author =       "Matthias Payer",
  title =        "The Fuzzing Hype-Train: How Random Testing Triggers
                 Thousands of Crashes",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "1",
  pages =        "78--82",
  month =        jan # "\slash " # feb,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2018.2889892",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "Computer bugs; Computer security; Fuzzing; fuzzing
                 hype-train; program debugging; program diagnostics;
                 program testing; random testing; security violation
                 detection; security-critical bugs; software bugs;
                 software crashes; software engineering; Software
                 reliability; software testing; triggering exceptions",
}

@Article{Schneier:2019:CPI,
  author =       "Bruce Schneier",
  title =        "Cybersecurity for the Public Interest",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "1",
  pages =        "84--83",
  month =        jan # "\slash " # feb,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2018.2889891",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "Computer security; Cryptography; cybersecurity;
                 Ethics; government policies; Government policies;
                 policy ramifications; public interest; Public policy;
                 security of data; Social factors; Social implications
                 of technology; Technology",
}

@Article{Anonymous:2019:BRR,
  author =       "Anonymous",
  title =        "{B. Ramkrishna Rau Award}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "1",
  pages =        "C3--C3",
  month =        jan # "\slash " # feb,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2900897",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2019:ICSc,
  author =       "Anonymous",
  title =        "{IEEE Computer Society Jobs Boards}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "1",
  pages =        "C4--C4",
  month =        jan # "\slash " # feb,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2900898",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2019:FCb,
  author =       "Anonymous",
  title =        "Front Cover",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "2",
  pages =        "C1--C1",
  month =        mar # "\slash " # apr,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2899708",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2019:IESb,
  author =       "Anonymous",
  title =        "{4th IEEE European Symposium on Security Privacy}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "2",
  pages =        "C2--C2",
  month =        mar # "\slash " # apr,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2903675",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2019:TCb,
  author =       "Anonymous",
  title =        "Table of Contents",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "2",
  pages =        "1--2",
  month =        mar # "\slash " # apr,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2899709",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2019:Mb,
  author =       "Anonymous",
  title =        "Masthead",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "2",
  pages =        "3--3",
  month =        mar # "\slash " # apr,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2899710",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Peisert:2019:SED,
  author =       "S. Peisert",
  title =        "Some Experiences in Developing Security Technology
                 That Actually Get Used",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "2",
  pages =        "4--7",
  month =        mar # "\slash " # apr,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2899711",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2019:RSb,
  author =       "Anonymous",
  title =        "{Reliability Society}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "2",
  pages =        "7--7",
  month =        mar # "\slash " # apr,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2908060",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Kyriazanos:2019:ADM,
  author =       "D. M. Kyriazanos and K. G. Thanos and S. C. A.
                 Thomopoulos",
  title =        "Automated Decision Making in Airport Checkpoints: Bias
                 Detection Toward Smarter Security and Fairness",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "2",
  pages =        "8--16",
  month =        mar # "\slash " # apr,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2018.2888777",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "airport checkpoints; airports; Airports; Artificial
                 intelligence; artificial intelligence security
                 solutions; automated decision making; bias detection;
                 data mining; Data privacy; data protection; decision
                 making; Decision making; Ethics; General Data
                 Protection Regulation; learning (artificial
                 intelligence); machine learning; risk-based security;
                 Security; security of data; Surveillance",
}

@Article{Anonymous:2019:SIS,
  author =       "Anonymous",
  title =        "{40th Symposium on IEEE Security Privacy}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "2",
  pages =        "16--16",
  month =        mar # "\slash " # apr,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2904070",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Abrams:2019:AIE,
  author =       "M. Abrams and J. Abrams and P. Cullen and L.
                 Goldstein",
  title =        "Artificial Intelligence, Ethics, and Enhanced Data
                 Stewardship",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "2",
  pages =        "17--30",
  month =        mar # "\slash " # apr,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2018.2888778",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "artificial intelligence; Artificial intelligence;
                 Computers; data handling; Data privacy; data
                 processing; data-enabled decisions; decision making;
                 enhanced data stewardship; ethical aspects; ethical
                 principles; Ethics; Ethics Project; IAF; Information
                 Accountability Foundation; Organizations; Standards
                 organizations",
}

@Article{DarvishRouani:2019:SML,
  author =       "B. {Darvish Rouani} and M. Samragh and T. Javidi and
                 F. Koushanfar",
  title =        "Safe Machine Learning and Defeating Adversarial
                 Attacks",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "2",
  pages =        "31--38",
  month =        mar # "\slash " # apr,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2018.2888779",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "adversarial attacks; autonomous agents; Data models;
                 decision making; Face; learning (artificial
                 intelligence); Machine learning; machine-learning model
                 unreliability; ML model assurance; multi-agent systems;
                 Perturbation methods; Redundancy; safe machine
                 learning; Safety; security of data",
}

@Article{Jalali:2019:ITP,
  author =       "M. S. Jalali and J. P. Kaiser and M. Siegel and S.
                 Madnick",
  title =        "The {Internet of Things} Promises New Benefits and
                 Risks: A Systematic Analysis of Adoption Dynamics of
                 {IoT} Products",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "2",
  pages =        "39--48",
  month =        mar # "\slash " # apr,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2018.2888780",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "adoption dynamics; buyers; Companies; Computer crime;
                 connected lighting product; cyber risk; cybersecurity;
                 Internet of Things; IoT adoption; IoT products;
                 lighting; obstacle; risk management; security of data;
                 Standards; system dynamics approach; systematic
                 analysis; Technological innovation",
}

@Article{Al-Rubaie:2019:PPM,
  author =       "M. Al-Rubaie and J. M. Chang",
  title =        "Privacy-Preserving Machine Learning: Threats and
                 Solutions",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "2",
  pages =        "49--58",
  month =        mar # "\slash " # apr,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2018.2888775",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "Computational modeling; Data models; data privacy;
                 data protection; Feature extraction; Image
                 reconstruction; knowledge gap; learning (artificial
                 intelligence); machine-learning systems; ML systems;
                 Predictive models; privacy communities; privacy
                 concerns; privacy-preserving machine learning; Testing;
                 Training",
}

@Article{Anonymous:2019:ISPb,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE \& Security Privacy}}} Subscribe",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "2",
  pages =        "58--58",
  month =        mar # "\slash " # apr,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2903676",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Horsman:2019:CPE,
  author =       "G. Horsman",
  title =        "A Call for the Prohibition of Encryption: Panacea or
                 Problem?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "2",
  pages =        "59--66",
  month =        mar # "\slash " # apr,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2018.2888776",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "cryptography; encrypted channels; encryption;
                 Encryption; evolved form; Organizations; Privacy;
                 Standards organizations; Surveillance; terror attack;
                 Terrorism; terrorism; western civilization",
}

@Article{Zou:2019:BMM,
  author =       "Y. Zou and F. Schaub",
  title =        "Beyond Mandatory: Making Data Breach Notifications
                 Useful for Consumers",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "2",
  pages =        "67--72",
  month =        mar # "\slash " # apr,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2897834",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "Atmospheric measurements; business data processing;
                 Companies; consumer security risk; Data breach; data
                 breach notifications; Data privacy; data privacy;
                 Monitoring; Particle measurements; privacy risks;
                 security of data",
}

@Article{Anonymous:2019:ITBb,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Transactions on Big Data}}}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "2",
  pages =        "72--72",
  month =        mar # "\slash " # apr,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2903677",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Nestler:2019:NCP,
  author =       "V. Nestler and T. Coulson and J. D. {Ashley III}",
  title =        "The {NICE Challenge Project}: Providing Workforce
                 Experience Before the Workforce",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "2",
  pages =        "73--78",
  month =        mar # "\slash " # apr,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2018.2888784",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "computer aided instruction; computer science
                 education; Computer security; Cybersecurity Education
                 Challenge Project; cybersecurity work roles;
                 Documentation; Education; educational courses;
                 Internet; National Initiative for Cybersecurity
                 Education; NICE Challenge Project; Operating systems;
                 realistic hands-on scenario; security of data; Task
                 analysis; workforce experience",
}

@Article{Geer:2019:UU,
  author =       "D. E. {Geer, Jr.}",
  title =        "Unknowable Unknowns",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "2",
  pages =        "80--79",
  month =        mar # "\slash " # apr,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2898636",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "Artificial intelligence; Computer security; Machine
                 learning; Privacy",
}

@Article{Anonymous:2019:IAHa,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Annals of the History of
                 Computing}}}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "2",
  pages =        "79--79",
  month =        mar # "\slash " # apr,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2903679",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2019:ICSd,
  author =       "Anonymous",
  title =        "{IEEE Computer Society} Information",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "2",
  pages =        "C3--C3",
  month =        mar # "\slash " # apr,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2901884",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2019:ICSe,
  author =       "Anonymous",
  title =        "{IEEE Computer Society Jobs Boards}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "2",
  pages =        "C4--C4",
  month =        mar # "\slash " # apr,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2903688",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2019:FCc,
  author =       "Anonymous",
  title =        "Front Cover",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "3",
  pages =        "C1--C1",
  month =        may # "\slash " # jun,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2901137",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2019:IWC,
  author =       "Anonymous",
  title =        "{IEEE World Congress on Services 2019}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "3",
  pages =        "C2--C2",
  month =        may # "\slash " # jun,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2911824",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2019:TCc,
  author =       "Anonymous",
  title =        "Table of Contents",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "3",
  pages =        "1--2",
  month =        may # "\slash " # jun,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2901138",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2019:Mc,
  author =       "Anonymous",
  title =        "Masthead",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "3",
  pages =        "3--3",
  month =        may # "\slash " # jun,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2910651",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{vanOorschot:2019:SSS,
  author =       "P. C. {van Oorschot}",
  title =        "Software Security and Systematizing Knowledge",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "3",
  pages =        "4--6",
  month =        may # "\slash " # jun,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2904127",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2019:RSc,
  author =       "Anonymous",
  title =        "{Reliability Society}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "3",
  pages =        "6--6",
  month =        may # "\slash " # jun,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2915744",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2019:SN,
  author =       "Anonymous",
  title =        "Social Networking",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "3",
  pages =        "7--7",
  month =        may # "\slash " # jun,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2911825",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Barth:2019:TES,
  author =       "S. Barth and P. Hartel and M. Junger and L. Montoya",
  title =        "Teaching Empirical Social-Science Research to
                 Cybersecurity Students: The Case of {``Thinking} Like a
                 Thief''",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "3",
  pages =        "8--16",
  month =        may # "\slash " # jun,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2018.2888781",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "Computer crime; computer science education; Computer
                 science education; computer science master students;
                 Cultural differences; cybersecurity students;
                 educational courses; educational experiment; human
                 factor; Human factors; human factors; security of data;
                 social sciences computing; student experiments;
                 teaching empirical social-science research; thief",
}

@Article{Toth:2019:SSD,
  author =       "K. C. Toth and A. Anderson-Priddy",
  title =        "Self-Sovereign Digital Identity: A Paradigm Shift for
                 Identity",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "3",
  pages =        "17--27",
  month =        may # "\slash " # jun,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2018.2888782",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "Data models; Data privacy; Digital systems; Password;
                 Privacy; Protocols",
}

@Article{vanderLinden:2019:BWY,
  author =       "D. {van der Linden} and A. Zamansky and I. Hadar and
                 B. Craggs and A. Rashid",
  title =        "Buddy's Wearable Is Not Your Buddy: Privacy
                 Implications of Pet Wearables",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "3",
  pages =        "28--39",
  month =        may # "\slash " # jun,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2018.2888783",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "Animals; buddy; Computer security; consumer device;
                 Data collection; data privacy; General Data Protection
                 Regulation; increasingly prevalent class; Mobile
                 handsets; pet wearables; Privacy; privacy implications;
                 privacy policies; wearable computers; Wearable
                 computing",
}

@Article{Siegel:2019:CPS,
  author =       "J. Siegel and S. Sarma",
  title =        "A Cognitive Protection System for the {Internet of
                 Things}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "3",
  pages =        "40--48",
  month =        may # "\slash " # jun,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2018.2884860",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "Adaptation models; Cloud computing; cognition;
                 cognitive firewall; cognitive protection system;
                 cognitive supervisor; command safety; Computational
                 modeling; conventional cybersecurity; firewalls;
                 Firewalls (computing); Internet of Things; Internet of
                 Things physicality; system models; system performance
                 monitoring; Temperature measurement; threat models",
}

@Article{Siegel:2019:UOC,
  author =       "J. E. Siegel and S. Sarma",
  title =        "Using Open Channels to Trigger the Invited, Unintended
                 Consequences of the {Internet of Things}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "3",
  pages =        "49--55",
  month =        may # "\slash " # jun,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2901430",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "Air gaps; Biometrics (access control); contextual
                 monitoring; device speakers; Internet of Things;
                 Internet of Things air gap; meta data; mobile
                 computing; Object recognition; open channels; Security;
                 source metadata embedding; speaker recognition;
                 two-factor authentication; voice assistants; Webcams",
}

@Article{Singla:2019:HDL,
  author =       "A. Singla and E. Bertino",
  title =        "How Deep Learning Is Making Information Security More
                 Intelligent",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "3",
  pages =        "56--65",
  month =        may # "\slash " # jun,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2902347",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "Artificial neural networks; Botnet; botnet detection;
                 Classification algorithms; deep-learning techniques;
                 Feature extraction; Information security; information
                 security; Intrusion detection; intrusion detection;
                 invasive software; learning (artificial intelligence);
                 Malware; malware analysis; newly released malware;
                 security community; security tasks; Task analysis",
}

@Article{Matheu:2019:TCC,
  author =       "S. N. Matheu and J. L. Hernandez-Ramos and A. F.
                 Skarmeta",
  title =        "Toward a Cybersecurity Certification Framework for the
                 {Internet of Things}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "3",
  pages =        "66--76",
  month =        may # "\slash " # jun,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2904475",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "certification; Certification; Computer security;
                 cybersecurity certification framework; Europe;
                 heterogeneous nature; Internet of Things; legal
                 perspectives; Risk management; security of data;
                 technical perspectives; Testing",
}

@Article{Phillips:2019:BYG,
  author =       "A. M. Phillips",
  title =        "Buying Your Genetic Self Online: Pitfalls and
                 Potential Reforms in {DNA} Testing",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "3",
  pages =        "77--81",
  month =        may # "\slash " # jun,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2904128",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "Data privacy; DNA; Genetics; Genomics; Industries;
                 Privacy",
}

@Article{Sherman:2019:PBL,
  author =       "A. T. Sherman and P. A. H. Peterson and E. Golaszewski
                 and E. LaFemina and E. Goldschen and M. Khan and L.
                 Mundy and M. Rather and B. Solis and W. Tete and E.
                 Valdez and B. Weber and D. Doyle and C. O'Brien and L.
                 Oliva and J. Roundy and J. Suess",
  title =        "Project-Based Learning Inspires Cybersecurity
                 Students: A Scholarship-for-Service Research Study",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "3",
  pages =        "82--88",
  month =        may # "\slash " # jun,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2900595",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "Computer security; Cryptography; Firewalls
                 (computing); Internet; Servers; Task analysis",
}

@Article{Anonymous:2019:SSP,
  author =       "Anonymous",
  title =        "Subscribe to {{\booktitle{Security \& Privacy}}}
                 Magazine",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "3",
  pages =        "88--88",
  month =        may # "\slash " # jun,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2911826",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2019:LCS,
  author =       "Anonymous",
  title =        "Letters of the {Computer Society}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "3",
  pages =        "89--89",
  month =        may # "\slash " # jun,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2911827",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Herardian:2019:SUC,
  author =       "R. Herardian",
  title =        "The Soft Underbelly of Cloud Security",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "3",
  pages =        "90--93",
  month =        may # "\slash " # jun,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2904112",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "Cloud computing; Computer hacking; Computer security;
                 Encryption; Firewalls; Software tools",
}

@Article{Anonymous:2019:SPM,
  author =       "Anonymous",
  title =        "{{\booktitle{Security \& Privacy}}} Magazine",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "3",
  pages =        "94--94",
  month =        may # "\slash " # jun,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2911828",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Bellovin:2019:LI,
  author =       "S. M. Bellovin",
  title =        "Layered Insecurity",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "3",
  pages =        "96--95",
  month =        may # "\slash " # jun,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2906807",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "Computer security; Cryptography; Encryption; Special
                 issues and sections",
}

@Article{Anonymous:2019:ITSb,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Transactions on Sustainable
                 Computing}}}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "3",
  pages =        "95--95",
  month =        may # "\slash " # jun,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2911829",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2019:ICSf,
  author =       "Anonymous",
  title =        "{IEEE Computer Society} Information",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "3",
  pages =        "C3--C3",
  month =        may # "\slash " # jun,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2904129",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2019:IJBa,
  author =       "Anonymous",
  title =        "{IEEE Jobs Board}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "3",
  pages =        "C4--C4",
  month =        may # "\slash " # jun,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2911830",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2019:FCd,
  author =       "Anonymous",
  title =        "[{Front} cover]",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "4",
  pages =        "C1--C1",
  month =        jul # "\slash " # aug,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2917484",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2019:ICEa,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Computing Edge}}}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "4",
  pages =        "C2--C2",
  month =        jul # "\slash " # aug,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2922086",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2019:TCd,
  author =       "Anonymous",
  title =        "Table of contents",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "4",
  pages =        "1--2",
  month =        jul # "\slash " # aug,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2917485",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2019:Md,
  author =       "Anonymous",
  title =        "Masthead",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "4",
  pages =        "3--3",
  month =        jul # "\slash " # aug,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2917486",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Epstein:2019:HRC,
  author =       "J. Epstein",
  title =        "A Horse's Rump and Cybersecurity",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "4",
  pages =        "4--6",
  month =        jul # "\slash " # aug,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2916238",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2019:RSd,
  author =       "Anonymous",
  title =        "{Reliability Society}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "4",
  pages =        "6--6",
  month =        jul # "\slash " # aug,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2926176",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Enck:2019:SPU,
  author =       "W. Enck and T. Benzel",
  title =        "Selected Papers From the {2018 USENIX Security
                 Symposium}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "4",
  pages =        "7--8",
  month =        jul # "\slash " # aug,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2915397",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "Computer security; Internet of Things; Meetings;
                 Privacy; Special issues and sections",
}

@Article{Anonymous:2019:ICSg,
  author =       "Anonymous",
  title =        "{IEEE Computer Society} Social Networking",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "4",
  pages =        "9--9",
  month =        jul # "\slash " # aug,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2922087",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Scaife:2019:MCL,
  author =       "N. Scaife and C. Peeters and P. G. Traynor",
  title =        "More Cowbell: Lessons Learned in Developing the Skim
                 Reaper",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "4",
  pages =        "10--17",
  month =        jul # "\slash " # aug,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2914017",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "Bluetooth; Computer hacking; Computer security;
                 cowbell; Credit cards; credit transactions; fraud; Law
                 enforcement; payment card fraud; Skim Reaper;
                 skimmers",
}

@Article{Anonymous:2019:IPCc,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Pervasive Computing}}} Call for
                 Articles",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "4",
  pages =        "17--17",
  month =        jul # "\slash " # aug,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2922088",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Kumar:2019:ETI,
  author =       "D. Kumar and R. Paccagnella and P. Murley and E.
                 Hennenfent and J. Mason and A. Bates and M. Bailey",
  title =        "Emerging Threats in {Internet of Things} Voice
                 Services",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "4",
  pages =        "18--24",
  month =        jul # "\slash " # aug,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2910013",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "Amazon Alexa; Amazon Echo; empirical analysis; Error
                 analysis; Internet of Things; Internet of Things voice
                 services; interpretation errors; Phonetics; security
                 implications; security of data; Servers; skill
                 squatting attacks; Speech recognition; speech
                 recognition; speech-recognition engine; Systematics",
}

@Article{Franken:2019:ECP,
  author =       "G. Franken and T. {Van Goethem} and W. Joosen",
  title =        "Exposing Cookie Policy Flaws Through an Extensive
                 Evaluation of Browsers and Their Extensions",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "4",
  pages =        "25--34",
  month =        jul # "\slash " # aug,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2909710",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "Authentication; browser users incentive; Browsers;
                 cookie policy flaws; data privacy; extensions;
                 Internet; Law; online abuses; online front-ends;
                 Privacy; third-party cookie policies; user privacy",
}

@Article{Stevens:2019:ADT,
  author =       "R. Stevens and D. Votipka and E. M. Redmiles and C.
                 Ahern and M. L. Mazurek",
  title =        "Applied Digital Threat Modeling: It Works",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "4",
  pages =        "35--42",
  month =        jul # "\slash " # aug,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2909714",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "applied digital threat modeling; command and control
                 systems; Computer security; digital defense
                 organization; mitigation strategies; New York City
                 cyber command; Organizations; risk analysis; Risk
                 management; risk management; security of data;
                 Training",
}

@Article{Schneider:2019:SBD,
  author =       "M. Schneider and S. Matetic and A. Juels and A. Miller
                 and S. Capkun",
  title =        "Secure Brokered Delegation Through {DelegaTEE}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "4",
  pages =        "43--52",
  month =        jul # "\slash " # aug,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2909712",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "access credentials; authorisation; Computer security;
                 contextually rich delegation policies; Credit cards;
                 DelegaTEE; gaTEE; Password; secure brokered delegation;
                 Task analysis; Web services",
}

@Article{Anonymous:2019:ISPc,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Security \& Privacy}}} Magazine
                 Subscribe",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "4",
  pages =        "52--52",
  month =        jul # "\slash " # aug,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2922089",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Breidenbach:2019:HFP,
  author =       "L. Breidenbach and P. Daian and F. Tramer and A.
                 Juels",
  title =        "The {Hydra} Framework for Principled, Automated Bug
                 Bounties",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "4",
  pages =        "53--61",
  month =        jul # "\slash " # aug,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2914109",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "automated bug bounties; automated bug bounty payouts;
                 Computer bugs; Computer hacking; Computer security;
                 contracts; cost-effective bounty protections;
                 Economics; hydra framework; N-version programming;
                 program debugging; Programming; security of data;
                 security-critical bugs; smart contracts; Smart
                 contracts",
}

@Article{Culnane:2019:KKR,
  author =       "C. Culnane and A. Essex and S. J. Lewis and O. Pereira
                 and V. Teague",
  title =        "Knights and Knaves Run Elections: {Internet} Voting
                 and Undetectable Electoral Fraud",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "4",
  pages =        "62--70",
  month =        jul # "\slash " # aug,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2915398",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "cryptographic weaknesses; cryptography; Cryptography;
                 e-voting system; electoral fraud; Electronic voting;
                 fraud; government data processing; Internet; Internet
                 voting systems; politics; trusted computing;
                 trustworthy elections",
}

@Article{Anonymous:2019:ITBc,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Transactions on Big Data}}}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "4",
  pages =        "70--70",
  month =        jul # "\slash " # aug,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2922090",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Sambasivan:2019:TGE,
  author =       "N. Sambasivan and N. Ahmed and A. Batool and E.
                 Bursztein and E. Churchill and L. {Sanely Gaytan-Lugo}
                 and T. Matthews and D. Nemar and K. Thomas and S.
                 Consolvo",
  title =        "Toward Gender-Equitable Privacy and Security in {South
                 Asia}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "4",
  pages =        "71--77",
  month =        jul # "\slash " # aug,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2912727",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "Computer security; data privacy; gender equity; Gender
                 issues; gender issues; gender-equitable privacy;
                 Internet; mobile Internet; online gender disparities;
                 Privacy; security of data; South Asia",
}

@Article{Anonymous:2019:ITSc,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Transactions on Sustainable
                 Computing}}}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "4",
  pages =        "77--77",
  month =        jul # "\slash " # aug,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2922091",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Beguin:2019:CSO,
  author =       "E. Beguin and S. Besnard and A. Cros and B. Joannes
                 and O. Leclerc-Istria and A. Noel and N. Roels and F.
                 Taleb and J. Thongphan and E. Alata and V. Nicomette",
  title =        "Computer-Security-Oriented Escape Room",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "4",
  pages =        "78--83",
  month =        jul # "\slash " # aug,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2912700",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "Computational modeling; computer attacks; computer
                 crime; Computer hacking; computer security; Computer
                 security; computer-security-oriented escape room;
                 current teaching methods; educational courses;
                 employees; escape rooms; escape-room scenarios;
                 hour-long real-life simulations; Institut National des
                 Sciences Appliqu{\'e}es de Toulouse; Learning systems;
                 lectures; Password; real-life situations;
                 security-related courses; Social engineering
                 (security); social-engineering attacks; spotting
                 phishing emails; teaching; videos",
}

@Article{Anonymous:2019:IAHb,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Annals of the History of
                 Computing}}}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "4",
  pages =        "83--83",
  month =        jul # "\slash " # aug,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2922808",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Gladyshev:2019:CCU,
  author =       "P. Gladyshev",
  title =        "Cybercrime as a Consequence of Unreasonable
                 Expectations",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "4",
  pages =        "84--87",
  month =        jul # "\slash " # aug,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2913772",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "computer crime; Computer crime; Computer hacking;
                 Computer security; cybercrime; dark web; Drug delivery;
                 electronic mail; Global Drugs Survey research team;
                 illicit drugs; Internet; lysergic acid diethylamide;
                 optical images; organic compounds; Packaging;
                 packaging; police data processing; postal mail",
}

@Article{Anonymous:2019:ICGa,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Computer Graphics Applications}}}
                 Magazine",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "4",
  pages =        "87--87",
  month =        jul # "\slash " # aug,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2922809",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Bates:2019:CDP,
  author =       "A. Bates and W. U. Hassan",
  title =        "Can Data Provenance Put an End to the Data Breach?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "4",
  pages =        "88--93",
  month =        jul # "\slash " # aug,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2913693",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "American credit system; Computer security; Data
                 breach; data breach; data provenance; Equifax;
                 Government; high-profile executive resignations;
                 Personnel; security of data; Stock market; stock
                 prices",
}

@Article{Anonymous:2019:IIPa,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE IT Professionals}}} Call for
                 Articles",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "4",
  pages =        "93--93",
  month =        jul # "\slash " # aug,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2922810",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Kobeissi:2019:SRF,
  author =       "N. Kobeissi",
  title =        "Selfie's Reflections on Formal Verification for
                 Transport Layer Security 1.3: Largely Opaque",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "4",
  pages =        "94--96",
  month =        jul # "\slash " # aug,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2913027",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "Computer hacking; computer network security; Computer
                 security; formal verification; Formal verification;
                 Software engineering; Transport Layer Security 1.3",
}

@Article{Anonymous:2019:IIC,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Internet Computing}}} Magazine",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "4",
  pages =        "97--97",
  month =        jul # "\slash " # aug,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2922811",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2019:ILC,
  author =       "Anonymous",
  title =        "{IEEE} Letters of the {Computer Society}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "4",
  pages =        "98--98",
  month =        jul # "\slash " # aug,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2922812",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2019:IIS,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Intelligent Systems}}} Magazine",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "4",
  pages =        "99--99",
  month =        jul # "\slash " # aug,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2922813",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2019:IMM,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Multimedia}}} Magazine",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "4",
  pages =        "99--99",
  month =        jul # "\slash " # aug,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2922814",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Geer:2019:O,
  author =       "D. E. Geer",
  title =        "Ownership",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "4",
  pages =        "100--99",
  month =        jul # "\slash " # aug,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2914845",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "Computer security; Privacy",
}

@Article{Anonymous:2019:ICSh,
  author =       "Anonymous",
  title =        "{IEEE Computer Society} Information",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "4",
  pages =        "C3--C3",
  month =        jul # "\slash " # aug,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2917487",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2019:ICSi,
  author =       "Anonymous",
  title =        "{IEEE Computer Society Jobs Boards}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "4",
  pages =        "C4--C4",
  month =        jul # "\slash " # aug,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2922092",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Aug 2 08:20:27 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2019:FCe,
  author =       "Anonymous",
  title =        "Front Cover",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "5",
  pages =        "C1--C1",
  month =        sep # "\slash " # oct,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2921178",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Sep 17 17:34:33 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2019:IJBb,
  author =       "Anonymous",
  title =        "{IEEE Jobs Board}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "5",
  pages =        "C2--C2",
  month =        sep # "\slash " # oct,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2933705",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Sep 17 17:34:33 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2019:TCe,
  author =       "Anonymous",
  title =        "Table of Contents",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "5",
  pages =        "1--2",
  month =        sep # "\slash " # oct,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2921179",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Sep 17 17:34:33 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2019:Me,
  author =       "Anonymous",
  title =        "Masthead",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "5",
  pages =        "3--3",
  month =        sep # "\slash " # oct,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2920769",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Sep 17 17:34:33 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Williams:2019:SLC,
  author =       "L. Williams",
  title =        "Science Leaves Clues",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "5",
  pages =        "4--6",
  month =        sep # "\slash " # oct,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2925648",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Sep 17 17:34:33 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "Professional communication; Research and development;
                 Writing",
}

@Article{Anonymous:2019:RSe,
  author =       "Anonymous",
  title =        "{Reliability Society}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "5",
  pages =        "6--6",
  month =        sep # "\slash " # oct,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2937428",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Sep 17 17:34:33 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{vanOorschot:2019:ITS,
  author =       "P. C. {van Oorschot} and S. W. Smith",
  title =        "The {Internet of Things}: Security Challenges",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "5",
  pages =        "7--9",
  month =        sep # "\slash " # oct,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2925918",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Sep 17 17:34:33 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "Computer security; Cyber-physical systems; Internet of
                 Things; Privacy; Special issues and sections",
}

@Article{Anonymous:2019:ICSj,
  author =       "Anonymous",
  title =        "{2019 IEEE Computer Society} Election",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "5",
  pages =        "9--9",
  month =        sep # "\slash " # oct,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2933706",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Sep 17 17:34:33 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Valente:2019:SSA,
  author =       "J. Valente and M. A. Wynn and A. A. Cardenas",
  title =        "Stealing, Spying, and Abusing: Consequences of Attacks
                 on {Internet of Things} Devices",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "5",
  pages =        "10--21",
  month =        sep # "\slash " # oct,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2924167",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Sep 17 17:34:33 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "Computer architecture; Computer security;
                 Cryptography; Drones; Internet of Things; Privacy; Risk
                 management",
}

@Article{Anonymous:2019:IIPb,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE IT Professionals}}} Call for
                 Papers",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "5",
  pages =        "21--21",
  month =        sep # "\slash " # oct,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2933707",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Sep 17 17:34:33 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Balliu:2019:SIA,
  author =       "M. Balliu and I. Bastys and A. Sabelfeld",
  title =        "Securing {IoT} Apps",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "5",
  pages =        "22--29",
  month =        sep # "\slash " # oct,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2914190",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Sep 17 17:34:33 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "Cloud computing; Computer applications; Google;
                 Internet of Things; Uniform resource locators",
}

@Article{Celik:2019:VIT,
  author =       "Z. B. Celik and P. McDaniel and G. Tan and L. Babun
                 and A. S. Uluagac",
  title =        "Verifying {Internet of Things} Safety and Security in
                 Physical Spaces",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "5",
  pages =        "30--37",
  month =        sep # "\slash " # oct,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2911511",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Sep 17 17:34:33 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "Computer Security; Cyber-physical systems; Internet of
                 Things; Physical design; Risk management; Safety",
}

@Article{Anonymous:2019:IPCd,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Pervasive Computing}}} Call for
                 Papers",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "5",
  pages =        "37--37",
  month =        sep # "\slash " # oct,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2933708",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Sep 17 17:34:33 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Hernandez:2019:TAF,
  author =       "G. Hernandez and F. Fowze and D. J. Tang and T. Yavuz
                 and P. Traynor and K. R. B. Butler",
  title =        "Toward Automated Firmware Analysis in the {IoT} Era",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "5",
  pages =        "38--46",
  month =        sep # "\slash " # oct,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2926462",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Sep 17 17:34:33 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "Analytical models; Hardware; Microprogramming;
                 Performance evaluation; Security; Static analysis;
                 Universal Serial Bus",
}

@Article{Anonymous:2019:ISPd,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Security \& Privacy}}} Subscribe",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "5",
  pages =        "46--46",
  month =        sep # "\slash " # oct,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2933709",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Sep 17 17:34:33 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Tschofenig:2019:CSM,
  author =       "H. Tschofenig and E. Baccelli",
  title =        "Cyberphysical Security for the Masses: A Survey of the
                 {Internet} Protocol Suite for {Internet of Things}
                 Security",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "5",
  pages =        "47--57",
  month =        sep # "\slash " # oct,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2923973",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Sep 17 17:34:33 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "Computer security; Cyber-physical systems; Hardware;
                 Internet of Things; Microprogramming; Software
                 development management",
}

@Article{Anonymous:2019:ITBd,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Transactions on Big Data}}}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "5",
  pages =        "57--57",
  month =        sep # "\slash " # oct,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2933710",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Sep 17 17:34:33 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Leon:2019:HBW,
  author =       "R. S. Leon and M. Kiperberg and A. A. {Leon Zabag} and
                 A. Resh and A. Algawi and N. J. Zaidenberg",
  title =        "Hypervisor-Based White Listing of Executables",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "5",
  pages =        "58--67",
  month =        sep # "\slash " # oct,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2910218",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Sep 17 17:34:33 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib;
                 https://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "Databases; Image segmentation; Linux;
                 Microprogramming; Monitoring; Operating systems;
                 Virtual machine monitors",
}

@Article{Jakobsson:2019:RTL,
  author =       "M. Jakobsson",
  title =        "The Rising Threat of Launchpad Attacks",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "5",
  pages =        "68--72",
  month =        sep # "\slash " # oct,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2922865",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Sep 17 17:34:33 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "Companies; Computer security; History; Internet;
                 Phishing; Privacy",
}

@Article{Anonymous:2019:ID,
  author =       "Anonymous",
  title =        "{IEEE DataPort}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "5",
  pages =        "73--73",
  month =        sep # "\slash " # oct,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2933711",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Sep 17 17:34:33 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Raaijmakers:2019:AIL,
  author =       "S. Raaijmakers",
  title =        "Artificial Intelligence for Law Enforcement:
                 Challenges and Opportunities",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "5",
  pages =        "74--77",
  month =        sep # "\slash " # oct,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2925649",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Sep 17 17:34:33 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "Artificial intelligence; Computational modeling;
                 Computer crime; Computer security; Data models; Digital
                 forensics; Law enforcement; Machine learning; Training
                 data",
}

@Article{Linkov:2019:ARH,
  author =       "I. Linkov and F. Baiardi and M. Florin and S. Greer
                 and J. H. Lambert and M. Pollock and J. Rickli and L.
                 Roslycky and T. Seager and H. Thorisson and B. D.
                 Trump",
  title =        "Applying Resilience to Hybrid Threats",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "5",
  pages =        "78--83",
  month =        sep # "\slash " # oct,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2922866",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Sep 17 17:34:33 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "Companies; Computer security; Government policies;
                 Information systems; Internet; Resilience; Software
                 engineering",
}

@Article{Anonymous:2019:ISM,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Software Magazine}}} Call For
                 Articles",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "5",
  pages =        "83--83",
  month =        sep # "\slash " # oct,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2933712",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Sep 17 17:34:33 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Arbuckle:2019:FSR,
  author =       "L. Arbuckle and F. Ritchie",
  title =        "The Five Safes of Risk-Based Anonymization",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "5",
  pages =        "84--89",
  month =        sep # "\slash " # oct,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2929282",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Sep 17 17:34:33 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "Computer security; Data analysis; Data privacy;
                 Ethics; Law; Risk management",
}

@Article{Anonymous:2019:ITSd,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Transactions on Sustainable
                 Computing}}}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "5",
  pages =        "89--89",
  month =        sep # "\slash " # oct,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2933713",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Sep 17 17:34:33 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Massacci:2019:DAV,
  author =       "F. Massacci",
  title =        "Is {``Deny} Access'' a Valid {``Fail-Safe} Default''
                 Principle for Building Security in Cyberphysical
                 Systems?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "5",
  pages =        "90--93",
  month =        sep # "\slash " # oct,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2918820",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Sep 17 17:34:33 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "Computer security; Cyber-physical systems; Heating
                 systems; Internet; Safety; Smart buildings; Software
                 engineering",
}

@Article{Anonymous:2019:ICSk,
  author =       "Anonymous",
  title =        "{IEEE Computer Society} Social Networking",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "5",
  pages =        "94--94",
  month =        sep # "\slash " # oct,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2933714",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Sep 17 17:34:33 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2019:ICSl,
  author =       "Anonymous",
  title =        "{2019 IEEE Computer Society} Election",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "5",
  pages =        "95--95",
  month =        sep # "\slash " # oct,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2933715",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Sep 17 17:34:33 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Bertino:2019:ITV,
  author =       "E. Bertino",
  title =        "It Takes a Village to Secure Cellular Networks",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "5",
  pages =        "96--95",
  month =        sep # "\slash " # oct,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2922867",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Sep 17 17:34:33 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "Cellular networks; Critical infrastructure; Network
                 security; Resource management; Telecommunication
                 network management",
}

@Article{Anonymous:2019:ICSm,
  author =       "Anonymous",
  title =        "{IEEE Computer Society} Information",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "5",
  pages =        "C3--C3",
  month =        sep # "\slash " # oct,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2921180",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Sep 17 17:34:33 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2019:ICEb,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Computing Edge}}}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "5",
  pages =        "C4--C4",
  month =        sep # "\slash " # oct,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2933716",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Sep 17 17:34:33 2019",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2019:FCf,
  author =       "Anonymous",
  title =        "[{Front} cover]",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "6",
  pages =        "C1--C1",
  month =        nov # "\slash " # dec,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2939035",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 21 14:45:55 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2019:CEM,
  author =       "Anonymous",
  title =        "{{\booktitle{Computing Edge}}} Magazine",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "6",
  pages =        "C2--C2",
  month =        nov # "\slash " # dec,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2945374",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 21 14:45:55 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2019:TCf,
  author =       "Anonymous",
  title =        "Table of contents",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "6",
  pages =        "1--2",
  month =        nov # "\slash " # dec,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2936696",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 21 14:45:55 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2019:Mf,
  author =       "Anonymous",
  title =        "Masthead",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "6",
  pages =        "3--3",
  month =        nov # "\slash " # dec,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2935667",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 21 14:45:55 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Michael:2019:TAM,
  author =       "J. B. Michael",
  title =        "Trustworthiness of Autonomous Machines in Armed
                 Conflict",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "6",
  pages =        "4--6",
  month =        nov # "\slash " # dec,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2938195",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 21 14:45:55 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2019:RSf,
  author =       "Anonymous",
  title =        "{Reliability Society}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "6",
  pages =        "5--5",
  month =        nov # "\slash " # dec,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2949325",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 21 14:45:55 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2019:TBD,
  author =       "Anonymous",
  title =        "{{\booktitle{Transactions on Big Data}}}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "6",
  pages =        "6--6",
  month =        nov # "\slash " # dec,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2945375",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 21 14:45:55 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Tene:2019:GYO,
  author =       "O. Tene and K. Evans and B. Gencarelli and G. Maldoff
                 and G. Zanfir-Fortuna",
  title =        "{GDPR} at Year One: Enter the Designers and
                 Engineers",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "6",
  pages =        "7--9",
  month =        nov # "\slash " # dec,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2938196",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 21 14:45:55 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "data protection; Data protection; Data Protection
                 Directive; data protection law; data protection
                 legislation; DPD; Europe; European data protection
                 regime; GDPR; General Data Protection Regulation;
                 government policies; Government policy; legislation;
                 Privacy; rich policy foundation; Special issues and
                 sections",
}

@Article{Momen:2019:DAP,
  author =       "N. Momen and M. Hatamian and L. Fritsch",
  title =        "Did App Privacy Improve After the {GDPR}?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "6",
  pages =        "10--20",
  month =        nov # "\slash " # dec,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2938445",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 21 14:45:55 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "app behavior; app privacy; Data collection; data
                 privacy; data protection; Europe; GDPR; general data
                 protection regulation; General Data Protection
                 Regulation; Google; legislation; mobile computing;
                 Privacy; Process control; regulatory change; Smart
                 phones",
}

@Article{Singh:2019:SID,
  author =       "J. Singh and J. Cobbe",
  title =        "The Security Implications of Data Subject Rights",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "6",
  pages =        "21--30",
  month =        nov # "\slash " # dec,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2914614",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 21 14:45:55 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "Authentication; Data protection; data protection; data
                 protection regulations; data subject rights;
                 fulfillment processes; individuals rights; Law;
                 legislation; organizational processes; Process control;
                 security implications; technical infrastructure",
}

@Article{Anonymous:2019:TSC,
  author =       "Anonymous",
  title =        "{{\booktitle{Transactions on Sustainable
                 Computing}}}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "6",
  pages =        "30--30",
  month =        nov # "\slash " # dec,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2945376",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 21 14:45:55 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Petrlic:2019:GDP,
  author =       "R. Petrlic",
  title =        "The {General Data Protection Regulation}: From a Data
                 Protection Authority's (Technical) Perspective",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "6",
  pages =        "31--36",
  month =        nov # "\slash " # dec,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2935701",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 21 14:45:55 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "data protection; Data protection; Europe; GDPR;
                 general data protection regulation; General Data
                 Protection Regulation; law; Privacy; privacy law;
                 Process control; Security",
}

@Article{Anonymous:2019:ICGb,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Computer Graphics and Applications
                 Magazine}}}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "6",
  pages =        "36--36",
  month =        nov # "\slash " # dec,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2946040",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 21 14:45:55 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Bartolini:2019:DPR,
  author =       "C. Bartolini and G. Lenzini and L. Robaldo",
  title =        "The {DAta Protection REgulation COmpliance} Model",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "6",
  pages =        "37--45",
  month =        nov # "\slash " # dec,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2937756",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 21 14:45:55 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "compliance checking; Data models; data protection;
                 Data protection; data protection regulation compliance
                 model; GDPR; General Data Protection Regulation;
                 general data protection regulations principles;
                 information retrieval; ISO Standards; Law; legal
                 informatics; legal reasoning; legal text; legislation;
                 semiautomatic processing; software design; text
                 analysis",
}

@Article{Yener:2019:CED,
  author =       "B. Yener and T. Gal",
  title =        "Cybersecurity in the Era of Data Science: Examining
                 New Adversarial Models",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "6",
  pages =        "46--53",
  month =        nov # "\slash " # dec,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2907097",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 21 14:45:55 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "adversarial model; AI/ML systems; Artificial
                 intelligence; Big Data; big data problem; Computer
                 security; cybersecurity; Data models; data science;
                 learning (artificial intelligence); machine-learning;
                 Malware; Real-time systems; security of data",
}

@Article{Riazi:2019:DLP,
  author =       "M. S. Riazi and B. {Darvish Rouani} and F.
                 Koushanfar",
  title =        "Deep Learning on Private Data",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "6",
  pages =        "54--63",
  month =        nov # "\slash " # dec,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2935666",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 21 14:45:55 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "Computational modeling; cryptographic methodologies;
                 Cryptography; cryptography; Data models; data privacy;
                 deep neural networks; inference; inference mechanisms;
                 learning (artificial intelligence); Logic gates; neural
                 nets; Neural networks; privacy-preserving deep
                 learning; private data; Servers; user logs",
}

@Article{Boneh:2019:HRT,
  author =       "D. Boneh and A. J. Grotto and P. McDaniel and N.
                 Papernot",
  title =        "How Relevant Is the {Turing Test} in the Age of
                 Sophisbots?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "6",
  pages =        "64--71",
  month =        nov # "\slash " # dec,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2934193",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 21 14:45:55 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "artificial intelligence; Detectors; Generative
                 adversarial networks; Generators; Information
                 integrity; intelligent machines; Social networking
                 (online); sophisbots; Turing machines; Turing test;
                 Videos",
}

@Article{Ruoti:2019:JJT,
  author =       "S. Ruoti and K. Seamons",
  title =        "{Johnny}'s Journey Toward Usable Secure Email",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "6",
  pages =        "72--76",
  month =        nov # "\slash " # dec,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2933683",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 21 14:45:55 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "Computer security; Electronic mail; electronic mail;
                 Encryption; Servers; Usability; usable key management;
                 usable secure email; usable-security community",
}

@Article{Sherman:2019:CHC,
  author =       "A. T. Sherman and L. Oliva and E. Golaszewski and D.
                 Phatak and T. Scheponik and G. L. Herman and D. S. Choi
                 and S. E. Offenberger and P. Peterson and J. Dykstra
                 and G. V. Bard and A. Chattopadhyay and F. Sharevski
                 and R. Verma and R. Vrecenar",
  title =        "The {CATS} Hackathon: Creating and Refining Test Items
                 for Cybersecurity Concept Inventories",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "6",
  pages =        "77--83",
  month =        nov # "\slash " # dec,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2929812",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 21 14:45:55 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "CATS hackathon; computer aided instruction; Computer
                 security; cybersecurity assessment tools; cybersecurity
                 concept inventories; cybersecurity curriculum
                 assessment; cybersecurity educators; cybersecurity
                 instruction; cybersecurity professionals; Education;
                 educational administrative data processing; educational
                 courses; evidence-based instruments; research-based
                 method; security of data; Task analysis; teaching",
}

@Article{Fasano:2019:RLB,
  author =       "A. Fasano and T. Leek and B. Dolan-Gavitt and J.
                 Bundt",
  title =        "The {Rode0day} to Less-Buggy Programs",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "6",
  pages =        "84--88",
  month =        nov # "\slash " # dec,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2933682",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 21 14:45:55 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "bugs; Computer bugs; computer programs; Computer
                 security; less-buggy programs; program debugging;
                 Reliability; Software engineering; Software testing",
}

@Article{Geer:2019:FD,
  author =       "D. E. Geer and D. Peterson",
  title =        "Failure as Design",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "6",
  pages =        "90--89",
  month =        nov # "\slash " # dec,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2936706",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 21 14:45:55 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "computer network reliability; computer network
                 security; Computer security; Constraint optimization;
                 constraint-based design problem; cybersecurity; Design
                 methodology; failure analysis; failure modes;
                 Microprogramming; network failure; security failures;
                 TCP/IP",
}

@Article{Anonymous:2019:ICSn,
  author =       "Anonymous",
  title =        "{IEEE Computer Society} Information",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "6",
  pages =        "C3--C3",
  month =        nov # "\slash " # dec,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2936697",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 21 14:45:55 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2019:IJBc,
  author =       "Anonymous",
  title =        "{IEEE Jobs Board}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "17",
  number =       "6",
  pages =        "C4--C4",
  month =        nov # "\slash " # dec,
  year =         "2019",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2945377",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 21 14:45:55 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2020:FCa,
  author =       "Anonymous",
  title =        "Front Cover",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "1",
  pages =        "C1--C1",
  month =        jan # "\slash " # feb,
  year =         "2020",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2953322",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 21 14:45:55 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2020:C,
  author =       "Anonymous",
  title =        "{Compsac 2020}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "1",
  pages =        "C2--C2",
  month =        jan # "\slash " # feb,
  year =         "2020",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2962587",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 21 14:45:55 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2020:TCa,
  author =       "Anonymous",
  title =        "Table of Contents",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "1",
  pages =        "1--2",
  month =        jan # "\slash " # feb,
  year =         "2020",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2953323",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 21 14:45:55 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2020:Ma,
  author =       "Anonymous",
  title =        "Masthead",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "1",
  pages =        "3--3",
  month =        jan # "\slash " # feb,
  year =         "2020",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2948744",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 21 14:45:55 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Nicol:2020:VUA,
  author =       "D. M. Nicol",
  title =        "The Value of Useless Academic Research to the
                 Cyberdefense of Critical Infrastructures",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "1",
  pages =        "4--7",
  month =        jan # "\slash " # feb,
  year =         "2020",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2951835",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 21 14:45:55 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2020:RSa,
  author =       "Anonymous",
  title =        "{Reliability Society}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "1",
  pages =        "6--6",
  month =        jan # "\slash " # feb,
  year =         "2020",
  DOI =          "https://doi.org/10.1109/MSEC.2020.2968166",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 21 14:45:55 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2020:ITC,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Transactions on Computers}}}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "1",
  pages =        "7--7",
  month =        jan # "\slash " # feb,
  year =         "2020",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2962590",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 21 14:45:55 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Charlet:2020:FCP,
  author =       "K. Charlet and H. King",
  title =        "The Future of Cybersecurity Policy",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "1",
  pages =        "8--10",
  month =        jan # "\slash " # feb,
  year =         "2020",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2953368",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 21 14:45:55 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "Computer security; Cyberattacks; Government policies;
                 Privacy; Special issues and sections",
}

@Article{Anonymous:2020:CST,
  author =       "Anonymous",
  title =        "{Computer Society} Technology Predictions",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "1",
  pages =        "10--10",
  month =        jan # "\slash " # feb,
  year =         "2020",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2962588",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 21 14:45:55 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2020:CEM,
  author =       "Anonymous",
  title =        "{{\booktitle{Computing Edge}}} Magazine",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "1",
  pages =        "11--11",
  month =        jan # "\slash " # feb,
  year =         "2020",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2962589",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 21 14:45:55 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Grotto:2020:DCA,
  author =       "A. Grotto",
  title =        "Deconstructing Cyber Attribution: A Proposed Framework
                 and Lexicon",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "1",
  pages =        "12--20",
  month =        jan # "\slash " # feb,
  year =         "2020",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2938134",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 21 14:45:55 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "Computer security; cyber attribution; Cyberattack;
                 evidentiary standards; Forensics; security of data",
}

@Article{Woods:2020:DIF,
  author =       "D. W. Woods and T. Moore",
  title =        "Does Insurance Have a Future in Governing
                 Cybersecurity?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "1",
  pages =        "21--27",
  month =        jan # "\slash " # feb,
  year =         "2020",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2935702",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 21 14:45:55 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "Computer security; cyber insurance; Cyberattacks;
                 cybersecurity; Industries; organisational aspects;
                 organizational security; private-sector; public policy
                 goals; security of data; Standards organizations",
}

@Article{Hernandez-Ramos:2020:TDD,
  author =       "J. L. Hernandez-Ramos and D. Geneiatakis and I.
                 Kounelis and G. Steri and I. {Nai Fovino}",
  title =        "Toward a Data-Driven Society: A Technological
                 Perspective on the Development of Cybersecurity and
                 Data-Protection Policies",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "1",
  pages =        "28--38",
  month =        jan # "\slash " # feb,
  year =         "2020",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2939728",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 21 14:45:55 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "Artificial intelligence; Blockchain; Computer
                 security; cybersecurity policies; data protection;
                 data-driven society; data-protection policies; European
                 Union; Market research; Privacy; security of data",
}

@Article{Klipstein:2020:UIE,
  author =       "M. Klipstein and A. Minter and J. Pittman",
  title =        "Understanding the Information Environment to Win the
                 Next Conflict Without Firing a Shot",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "1",
  pages =        "39--45",
  month =        jan # "\slash " # feb,
  year =         "2020",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2935064",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 21 14:45:55 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "5G mobile communication; Economics; Government
                 policies; Information and communication technology;
                 information and communication technology; information
                 environment; information systems; Law; Smart phones;
                 sway sentiment",
}

@Article{Sterlini:2020:GCE,
  author =       "P. Sterlini and F. Massacci and N. Kadenko and T.
                 Fiebig and M. {van Eeten}",
  title =        "Governance Challenges for {European} Cybersecurity
                 Policies: Stakeholder Views",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "1",
  pages =        "46--54",
  month =        jan # "\slash " # feb,
  year =         "2020",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2945309",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 21 14:45:55 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "Computer security; cybersecurity governance; Europe;
                 European cybersecurity policies; European Union
                 network; Industries; legislation; Organizations;
                 Research and development; security of data; stakeholder
                 views; Stakeholders",
}

@Article{Horowitz:2020:CRC,
  author =       "B. M. Horowitz",
  title =        "Cyberattack-Resilient Cyberphysical Systems",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "1",
  pages =        "55--60",
  month =        jan # "\slash " # feb,
  year =         "2020",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2947123",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 21 14:45:55 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "advanced automation; Automation; automation
                 opportunities; automobiles; cyber-physical systems;
                 Cyberattack; cyberattack risks; cyberattack-resilient
                 cyberphysical systems; human life; Internet of Things;
                 national attention; physical systems; Redundancy;
                 Resilience; security of data; serious injury; Stuxnet
                 cyberattack; Switches; unmanned air vehicles",
}

@Article{Stallings:2020:HPI,
  author =       "W. Stallings",
  title =        "Handling of Personal Information and Deidentified,
                 Aggregated, and Pseudonymized Information Under the
                 {California Consumer Privacy Act}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "1",
  pages =        "61--64",
  month =        jan # "\slash " # feb,
  year =         "2020",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2953324",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 21 14:45:55 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "California consumer privacy act; California Consumer
                 Privacy Act; CCPA; data privacy; Data privacy;
                 Government policies; History; influential state-level
                 data privacy law; Internet; Law; personal information;
                 Privacy; pseudonymized information; state privacy laws;
                 United States",
}

@Article{Howard:2020:BCF,
  author =       "J. P. Howard and M. E. Vachino",
  title =        "Blockchain Compliance With Federal Cryptographic
                 Information-Processing Standards",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "1",
  pages =        "65--70",
  month =        jan # "\slash " # feb,
  year =         "2020",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2944290",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 21 14:45:55 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2020.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "Blockchain; blockchain technologies; cryptography;
                 Cryptography; Digital signatures; distributed
                 databases; Distributed ledger; Ethereum technologies;
                 Federal cryptographic Information-processing Standards;
                 Federal Information Security Management Act; FISMA;
                 Government policies; Hyperledger Fabric technologies;
                 multichain technologies; National Institute of
                 Standards and Technology cryptographic standards; NIST;
                 NIST compliance; R3s Corda technologies",
}

@Article{Schneier:2020:TVP,
  author =       "B. Schneier",
  title =        "Technologists vs. Policy Makers",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "1",
  pages =        "72--71",
  month =        jan # "\slash " # feb,
  year =         "2020",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2951825",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 21 14:45:55 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2020.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "Computer security; Cryptography; Encryption;
                 Government policies; Law; Technology",
}

@Article{Anonymous:2020:ICSa,
  author =       "Anonymous",
  title =        "{IEEE Computer Society} Information",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "1",
  pages =        "C3--C3",
  month =        jan # "\slash " # feb,
  year =         "2020",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2953431",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 21 14:45:55 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2020:IJB,
  author =       "Anonymous",
  title =        "{IEEE Jobs Board}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "1",
  pages =        "C4--C4",
  month =        jan # "\slash " # feb,
  year =         "2020",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2962591",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 21 14:45:55 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Carlin:2020:YCM,
  author =       "D. Carlin and J. Burgess and P. O'Kane and S. Sezer",
  title =        "You Could Be Mine(d): The Rise of Cryptojacking",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "2",
  pages =        "16--22",
  month =        mar # "\slash " # apr,
  year =         "2020",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2920585",
  ISSN =         "1558-4046",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 27 17:52:17 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "bitcoin; browsers; computer crime; computer hacking;
                 cryptocurrency; malware",
}

@Article{Nour:2020:SPC,
  author =       "B. Nour and K. Sharif and F. Li and Y. Wang",
  title =        "Security and Privacy Challenges in Information-Centric
                 Wireless {Internet of Things} Networks",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "2",
  pages =        "35--45",
  month =        mar # "\slash " # apr,
  year =         "2020",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2925337",
  ISSN =         "1558-4046",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 27 17:52:17 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "computer security; Internet of Things; logic gates;
                 privacy; wireless communication; wireless sensor
                 networks",
}

@Article{Allodi:2020:NNA,
  author =       "L. Allodi and T. Chotza and E. Panina and N. Zannone",
  title =        "The Need for New Antiphishing Measures Against
                 Spear-Phishing Attacks",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "2",
  pages =        "23--34",
  month =        mar # "\slash " # apr,
  year =         "2020",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2940952",
  ISSN =         "1558-4046",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 27 17:52:17 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "computer hacking; Internet; malware; market research;
                 phishing",
}

@Article{Farahmand:2020:QIC,
  author =       "F. Farahmand",
  title =        "Quantitative Issues in Cyberinsurance: Lessons From
                 Behavioral Economics, Counterfactuals, and Causal
                 Inference",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "2",
  pages =        "8--15",
  month =        mar # "\slash " # apr,
  year =         "2020",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2930054",
  ISSN =         "1558-4046",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 27 17:52:17 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "behavioral sciences; computer security; data analysis;
                 data breach; economics; industries; insurance; market
                 research",
}

@Article{Anonymous:2020:Ea,
  author =       "Anonymous",
  title =        "Errata",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "2",
  pages =        "55--55",
  month =        mar # "\slash " # apr,
  year =         "2020",
  DOI =          "https://doi.org/10.1109/MSEC.2020.2975406",
  ISSN =         "1558-4046",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 27 17:52:17 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "computer science; conferences; cryptography;
                 electronic mail; privacy; technological innovation",
}

@Article{Anonymous:2020:Mb,
  author =       "Anonymous",
  title =        "Masthead",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "2",
  pages =        "3--3",
  month =        mar # "\slash " # apr,
  year =         "2020",
  DOI =          "https://doi.org/10.1109/MSEC.2020.2966901",
  ISSN =         "1558-4046",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 27 17:52:17 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2020:ICSb,
  author =       "Anonymous",
  title =        "{IEEE Computer Society} Information",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "2",
  pages =        "C3--C3",
  month =        mar # "\slash " # apr,
  year =         "2020",
  DOI =          "https://doi.org/10.1109/MSEC.2020.2966899",
  ISSN =         "1558-4046",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 27 17:52:17 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Souvignet:2020:LLL,
  author =       "T. R. Souvignet and T. Heckmann and T. Bolle",
  title =        "From {Lucky Luke} to Lock Bits",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "2",
  pages =        "61--66",
  month =        mar # "\slash " # apr,
  year =         "2020",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2944385",
  ISSN =         "1558-4046",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 27 17:52:17 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2020.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "bluetooth; encryption; microcontrollers; monitoring;
                 online banking",
}

@Article{Anonymous:2020:RSb,
  author =       "Anonymous",
  title =        "{Reliability Society}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "2",
  pages =        "6--6",
  month =        mar # "\slash " # apr,
  year =         "2020",
  DOI =          "https://doi.org/10.1109/MSEC.2020.2981181",
  ISSN =         "1558-4046",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 27 17:52:17 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2020:TCb,
  author =       "Anonymous",
  title =        "Table of Contents",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "2",
  pages =        "1--2",
  month =        mar # "\slash " # apr,
  year =         "2020",
  DOI =          "https://doi.org/10.1109/MSEC.2020.2975335",
  ISSN =         "1558-4046",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 27 17:52:17 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Jakobsson:2020:PP,
  author =       "M. Jakobsson",
  title =        "Permissions and Privacy",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "2",
  pages =        "46--55",
  month =        mar # "\slash " # apr,
  year =         "2020",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2946330",
  ISSN =         "1558-4046",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 27 17:52:17 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2020.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "authentication; big data; brand management; companies;
                 data privacy; psychology; temperature sensors",
}

@Article{vanOorschot:2020:USP,
  author =       "P. C. van Oorschot",
  title =        "Untangling Security and Privacy",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "2",
  pages =        "4--6",
  month =        mar # "\slash " # apr,
  year =         "2020",
  DOI =          "https://doi.org/10.1109/MSEC.2020.2964936",
  ISSN =         "1558-4046",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 27 17:52:17 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Jauernig:2020:TEE,
  author =       "P. Jauernig and A. Sadeghi and E. Stapf",
  title =        "Trusted Execution Environments: Properties,
                 Applications, and Challenges",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "2",
  pages =        "56--60",
  month =        mar # "\slash " # apr,
  year =         "2020",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2947124",
  ISSN =         "1558-4046",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 27 17:52:17 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2020.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "computer architecture; computer hacking; encryption;
                 hardware; mobile handsets; operating systems",
}

@Article{Bellovin:2020:PP,
  author =       "S. M. Bellovin",
  title =        "Policies on Privacy",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "2",
  pages =        "76--76",
  month =        mar # "\slash " # apr,
  year =         "2020",
  DOI =          "https://doi.org/10.1109/MSEC.2020.2966900",
  ISSN =         "1558-4046",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 27 17:52:17 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "computer security; privacy",
}

@Article{Pencheva:2020:BCS,
  author =       "D. Pencheva and J. Hallett and A. Rashid",
  title =        "Bringing Cyber to School: Integrating Cybersecurity
                 Into Secondary School Education",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "2",
  pages =        "68--74",
  month =        mar # "\slash " # apr,
  year =         "2020",
  DOI =          "https://doi.org/10.1109/MSEC.2020.2969409",
  ISSN =         "1558-4046",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 27 17:52:17 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "computer security; education; engineering profession;
                 safety; training",
}

@Article{Calzavara:2020:MLW,
  author =       "S. Calzavara and M. Conti and R. Focardi and A.
                 Rabitti and G. Tolomei",
  title =        "Machine Learning for Web Vulnerability Detection: The
                 Case of Cross-Site Request Forgery",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "3",
  pages =        "8--16",
  month =        may # "\slash " # jun,
  year =         "2020",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2961649",
  ISSN =         "1558-4046",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 27 17:52:17 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "browsers; forgery; machine learning; security; social
                 networking (online); supervised learning; tools",
}

@Article{Chen:2020:SSI,
  author =       "G. Chen and S. Chen and Y. Xiao and Y. Zhang and Z.
                 Lin and T. Lai",
  title =        "{SgxPectre}: Stealing {Intel} Secrets From {SGX}
                 Enclaves via Speculative Execution",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "3",
  pages =        "28--37",
  month =        may # "\slash " # jun,
  year =         "2020",
  DOI =          "https://doi.org/10.1109/MSEC.2019.2963021",
  ISSN =         "1558-4046",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 27 17:52:17 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2020.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "computer security; hardware; microarchitecture;
                 program processors; registers",
}

@Article{vanderKouwe:2020:BFU,
  author =       "E. van der Kouwe and G. Heiser and D. Andriesse and H.
                 Bos and C. Giuffrida",
  title =        "Benchmarking Flaws Undermine Security Research",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "3",
  pages =        "48--57",
  month =        may # "\slash " # jun,
  year =         "2020",
  DOI =          "https://doi.org/10.1109/MSEC.2020.2969862",
  ISSN =         "1558-4046",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 27 17:52:17 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "benchmark testing; computer security; fault diagnosis;
                 privacy; throughput",
}

@Article{Tian:2020:SUG,
  author =       "Y. Tian and C. Herley and S. Schechter",
  title =        "{StopGuessing}: Using Guessed Passwords to Thwart
                 Online Password Guessing",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "3",
  pages =        "38--47",
  month =        may # "\slash " # jun,
  year =         "2020",
  DOI =          "https://doi.org/10.1109/MSEC.2020.2970639",
  ISSN =         "1558-4046",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 27 17:52:17 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "access control; arrays; computer security; ip
                 networks; object recognition; password",
}

@Article{Zhang:2020:EPC,
  author =       "F. Zhang and W. He and R. Cheng and J. Kos and N.
                 Hynes and N. Johnson and A. Juels and A. Miller and D.
                 Song",
  title =        "The {Ekiden} Platform for Confidentiality-Preserving,
                 Trustworthy, and Performant Smart Contracts",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "3",
  pages =        "17--27",
  month =        may # "\slash " # jun,
  year =         "2020",
  DOI =          "https://doi.org/10.1109/MSEC.2020.2976984",
  ISSN =         "1558-4046",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 27 17:52:17 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/cryptography2020.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "blockchain; cryptography; privacy; smart contracts",
}

@Article{Nicol:2020:PDC,
  author =       "D. M. Nicol",
  title =        "In the {Petri} Dish: Cybersecurity Pushed to the
                 Edge",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "3",
  pages =        "4--5",
  month =        may # "\slash " # jun,
  year =         "2020",
  DOI =          "https://doi.org/10.1109/MSEC.2020.2983357",
  ISSN =         "1558-4046",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 27 17:52:17 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Berger:2020:ACT,
  author =       "K. M. Berger",
  title =        "Addressing Cyber Threats in Biology",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "3",
  pages =        "58--61",
  month =        may # "\slash " # jun,
  year =         "2020",
  DOI =          "https://doi.org/10.1109/MSEC.2020.2966110",
  ISSN =         "1558-4046",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 27 17:52:17 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "biological information theory; biotechnology; computer
                 hacking; cyberattack",
}

@Article{Anonymous:2020:Eb,
  author =       "Anonymous",
  title =        "Errata",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "3",
  pages =        "61--61",
  month =        may # "\slash " # jun,
  year =         "2020",
  DOI =          "https://doi.org/10.1109/MSEC.2020.2983268",
  ISSN =         "1558-4046",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 27 17:52:17 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "biographies; cyberattack; education; rivers;
                 vaccines",
}

@Article{Anonymous:2020:Mc,
  author =       "Anonymous",
  title =        "Masthead",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "3",
  pages =        "3--3",
  month =        may # "\slash " # jun,
  year =         "2020",
  DOI =          "https://doi.org/10.1109/MSEC.2020.2988375",
  ISSN =         "1558-4046",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 27 17:52:17 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Bertino:2020:QDT,
  author =       "E. Bertino",
  title =        "The Quest for Data Transparency",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "3",
  pages =        "67--68",
  month =        may # "\slash " # jun,
  year =         "2020",
  DOI =          "https://doi.org/10.1109/MSEC.2020.2980593",
  ISSN =         "1558-4046",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 27 17:52:17 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2020:TCc,
  author =       "Anonymous",
  title =        "Table of Contents",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "3",
  pages =        "1--2",
  month =        may # "\slash " # jun,
  year =         "2020",
  DOI =          "https://doi.org/10.1109/MSEC.2020.2988374",
  ISSN =         "1558-4046",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 27 17:52:17 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Benzel:2020:IES,
  author =       "T. Benzel and F. Stajano",
  title =        "{IEEE Euro S\&P}: The Younger Sibling Across the Pond
                 Following in {Oakland}'s Footsteps",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "3",
  pages =        "6--7",
  month =        may # "\slash " # jun,
  year =         "2020",
  DOI =          "https://doi.org/10.1109/MSEC.2020.2980180",
  ISSN =         "1558-4046",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 27 17:52:17 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "meetings; privacy; security; special issues and
                 sections",
}

@Article{Kott:2020:DWI,
  author =       "A. Kott and P. Theron",
  title =        "Doers, Not Watchers: Intelligent Autonomous Agents Are
                 a Path to Cyber Resilience",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "3",
  pages =        "62--66",
  month =        may # "\slash " # jun,
  year =         "2020",
  DOI =          "https://doi.org/10.1109/MSEC.2020.2983714",
  ISSN =         "1558-4046",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 27 17:52:17 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
  keywords =     "autonomous agents; collaboration; computer security;
                 intelligent agents; malware; resilience",
}

@Article{Anonymous:2020:RSc,
  author =       "Anonymous",
  title =        "{Reliability Society}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "3",
  pages =        "5--5",
  month =        may # "\slash " # jun,
  year =         "2020",
  DOI =          "https://doi.org/10.1109/MSEC.2020.2981215",
  ISSN =         "1558-4046",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 27 17:52:17 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2020:FCb,
  author =       "Anonymous",
  title =        "Front Cover",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "4",
  pages =        "C1--C1",
  month =        jul # "\slash " # aug,
  year =         "2020",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jul 27 19:09:26 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2020:ICSc,
  author =       "Anonymous",
  title =        "{IEEE Computer Society} Member Benefits",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "4",
  pages =        "C2--C2",
  month =        jul # "\slash " # aug,
  year =         "2020",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jul 27 19:09:26 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2020:TCd,
  author =       "Anonymous",
  title =        "Table of Contents",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "4",
  pages =        "1--2",
  month =        jul # "\slash " # aug,
  year =         "2020",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jul 27 19:09:26 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2020:Md,
  author =       "Anonymous",
  title =        "Masthead",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "4",
  pages =        "3--3",
  month =        jul # "\slash " # aug,
  year =         "2020",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jul 27 19:09:26 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Peisert:2020:IIC,
  author =       "S. Peisert",
  title =        "Isolating Insecurely: A Call to Arms for the Security
                 and Privacy Community During the Time of {COVID-19}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "4",
  pages =        "4--7",
  month =        jul # "\slash " # aug,
  year =         "2020",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jul 27 19:09:26 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2020:RSd,
  author =       "Anonymous",
  title =        "Reliability Society",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "4",
  pages =        "5--5",
  month =        jul # "\slash " # aug,
  year =         "2020",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jul 27 19:09:26 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Okhravi:2020:OGL,
  author =       "H. Okhravi and N. Burow and R. Skowyra and B. C. Ward
                 and S. Jero and R. Kazan and H. Shrobe",
  title =        "One Giant Leap for Computer Security",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "4",
  pages =        "8--19",
  month =        jul # "\slash " # aug,
  year =         "2020",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jul 27 19:09:26 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2020:IIPa,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE IT Professional}}} Call for
                 Articles",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "4",
  pages =        "19--19",
  month =        jul # "\slash " # aug,
  year =         "2020",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jul 27 19:09:26 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Dietz:2020:UDT,
  author =       "M. Dietz and G. Pernul",
  title =        "Unleashing the Digital Twin's Potential for {ICS}
                 Security",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "4",
  pages =        "20--27",
  month =        jul # "\slash " # aug,
  year =         "2020",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jul 27 19:09:26 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Camp:2020:TSI,
  author =       "J. Camp and R. Henry and T. Kohno and S. Mare and S.
                 Myers and S. Patel and J. Streiff",
  title =        "Toward a Secure {Internet of Things}: Directions for
                 Research",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "4",
  pages =        "28--37",
  month =        jul # "\slash " # aug,
  year =         "2020",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jul 27 19:09:26 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2020:ICGa,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Computer Graphics \&
                 Applications}}}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "4",
  pages =        "37--37",
  month =        jul # "\slash " # aug,
  year =         "2020",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jul 27 19:09:26 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Momenzadeh:2020:BPW,
  author =       "B. Momenzadeh and H. Dougherty and M. Remmel and S.
                 Myers and L. J. Camp",
  title =        "Best Practices Would Make Things Better in the {IoT}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "4",
  pages =        "38--47",
  month =        jul # "\slash " # aug,
  year =         "2020",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jul 27 19:09:26 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Tondel:2020:ISM,
  author =       "I. A. Tondel and M. {Gilje Jaatun} and D. {Soares
                 Cruzes}",
  title =        "{IT} Security Is From {Mars}, Software Security Is
                 From {Venus}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "4",
  pages =        "48--54",
  month =        jul # "\slash " # aug,
  year =         "2020",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jul 27 19:09:26 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2020:AWC,
  author =       "Anonymous",
  title =        "{AI}'s 10 to Watch Call for Nominations",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "4",
  pages =        "55--55",
  month =        jul # "\slash " # aug,
  year =         "2020",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jul 27 19:09:26 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{ElEmam:2020:SWE,
  author =       "K. {El Emam}",
  title =        "Seven Ways to Evaluate the Utility of Synthetic Data",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "4",
  pages =        "56--59",
  month =        jul # "\slash " # aug,
  year =         "2020",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jul 27 19:09:26 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Shoemaker:2020:TSA,
  author =       "D. Shoemaker and N. R. Mead and A. Kohnke",
  title =        "Teaching Secure Acquisition in Higher Education",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "4",
  pages =        "60--66",
  month =        jul # "\slash " # aug,
  year =         "2020",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jul 27 19:09:26 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2020:IPCa,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Pervasive Computing}}} Call for
                 Articles",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "4",
  pages =        "66--66",
  month =        jul # "\slash " # aug,
  year =         "2020",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jul 27 19:09:26 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Osterweil:2020:CTU,
  author =       "E. Osterweil",
  title =        "A Cybersecurity Terminarch: Use It Before We Lose It",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "4",
  pages =        "67--70",
  month =        jul # "\slash " # aug,
  year =         "2020",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jul 27 19:09:26 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2020:ISP,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Security \& Privacy}}}
                 [Advertisement]",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "4",
  pages =        "70--70",
  month =        jul # "\slash " # aug,
  year =         "2020",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jul 27 19:09:26 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2020:HDS,
  author =       "Anonymous",
  title =        "{HOST 2020: 6--9 Dec. 2020, San Jose, CA}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "4",
  pages =        "71--71",
  month =        jul # "\slash " # aug,
  year =         "2020",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jul 27 19:09:26 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Mack:2020:SMC,
  author =       "H. Mack and T. Schroer",
  title =        "Security Midlife Crisis: Building Security in a New
                 World",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "4",
  pages =        "72--74",
  month =        jul # "\slash " # aug,
  year =         "2020",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jul 27 19:09:26 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Geer:2020:STB,
  author =       "D. E. Geer",
  title =        "Security Theater, the Beat Goes On",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "4",
  pages =        "75--76",
  month =        jul # "\slash " # aug,
  year =         "2020",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jul 27 19:09:26 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2020:STI,
  author =       "Anonymous",
  title =        "Submit today: {{\booktitle{IEEE Transactions on Big
                 Data}}}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "4",
  pages =        "75--75",
  month =        jul # "\slash " # aug,
  year =         "2020",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jul 27 19:09:26 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2020:ICSd,
  author =       "Anonymous",
  title =        "{IEEE Computer Society} Information",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "4",
  pages =        "C3--C3",
  month =        jul # "\slash " # aug,
  year =         "2020",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jul 27 19:09:26 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2020:ICEa,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Computing Edge}}}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "4",
  pages =        "C4--C4",
  month =        jul # "\slash " # aug,
  year =         "2020",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jul 27 19:09:26 2020",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2020:FCc,
  author =       "Anonymous",
  title =        "Front Cover",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "5",
  pages =        "C1--C1",
  month =        sep # "\slash " # oct,
  year =         "2020",
  DOI =          "https://doi.org/10.1109/MSEC.2020.3007242",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 5 14:25:50 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2020:TCe,
  author =       "Anonymous",
  title =        "Table of Contents",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "5",
  pages =        "C2--1",
  month =        sep # "\slash " # oct,
  year =         "2020",
  DOI =          "https://doi.org/10.1109/MSEC.2020.3007243",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 5 14:25:50 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2020:Me,
  author =       "Anonymous",
  title =        "Masthead",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "5",
  pages =        "2--2",
  month =        sep # "\slash " # oct,
  year =         "2020",
  DOI =          "https://doi.org/10.1109/MSEC.2020.3007245",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 5 14:25:50 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{vanOorschot:2020:BST,
  author =       "P. C. {van Oorschot}",
  title =        "Blockchains and Stealth Tactics for Teaching
                 Security",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "5",
  pages =        "3--5",
  month =        sep # "\slash " # oct,
  year =         "2020",
  DOI =          "https://doi.org/10.1109/MSEC.2020.3004974",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 5 14:25:50 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2020:RSe,
  author =       "Anonymous",
  title =        "Reliability Society",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "5",
  pages =        "4--4",
  month =        sep # "\slash " # oct,
  year =         "2020",
  DOI =          "https://doi.org/10.1109/MSEC.2020.2981217",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 5 14:25:50 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Mannan:2020:CLH,
  author =       "M. Mannan and N. Asokan",
  title =        "Confronting the Limitations of Hardware-Assisted
                 Security",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "5",
  pages =        "6--7",
  month =        sep # "\slash " # oct,
  year =         "2020",
  DOI =          "https://doi.org/10.1109/MSEC.2020.3015413",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 5 14:25:50 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2020:ITS,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Transactions on Sustainable
                 Computing}}}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "5",
  pages =        "7--7",
  month =        sep # "\slash " # oct,
  year =         "2020",
  DOI =          "https://doi.org/10.1109/MSEC.2020.3015401",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 5 14:25:50 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Zhao:2020:HMS,
  author =       "L. Zhao and D. Lie",
  title =        "Is Hardware More Secure Than Software?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "5",
  pages =        "8--17",
  month =        sep # "\slash " # oct,
  year =         "2020",
  DOI =          "https://doi.org/10.1109/MSEC.2020.2994827",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 5 14:25:50 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2020:IAH,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Annals of the History of
                 Computing}}}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "5",
  pages =        "17--17",
  month =        sep # "\slash " # oct,
  year =         "2020",
  DOI =          "https://doi.org/10.1109/MSEC.2020.3015402",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 5 14:25:50 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Schwarz:2020:HTE,
  author =       "M. Schwarz and D. Gruss",
  title =        "How Trusted Execution Environments Fuel Research on
                 Microarchitectural Attacks",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "5",
  pages =        "18--27",
  month =        sep # "\slash " # oct,
  year =         "2020",
  DOI =          "https://doi.org/10.1109/MSEC.2020.2993896",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 5 14:25:50 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Murdock:2020:PHL,
  author =       "K. Murdock and D. Oswald and F. D. Garcia and J. {Van
                 Bulck} and F. Piessens and D. Gruss",
  title =        "{Plundervolt}: How a Little Bit of Undervolting Can
                 Create a Lot of Trouble",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "5",
  pages =        "28--37",
  month =        sep # "\slash " # oct,
  year =         "2020",
  DOI =          "https://doi.org/10.1109/MSEC.2020.2990495",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 5 14:25:50 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2020:ICGb,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Computer Graphics \&
                 Applications}}}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "5",
  pages =        "37--37",
  month =        sep # "\slash " # oct,
  year =         "2020",
  DOI =          "https://doi.org/10.1109/MSEC.2020.3015403",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 5 14:25:50 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Kostiainen:2020:DSC,
  author =       "K. Kostiainen and A. Dhar and S. Capkun",
  title =        "Dedicated Security Chips in the Age of Secure
                 Enclaves",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "5",
  pages =        "38--46",
  month =        sep # "\slash " # oct,
  year =         "2020",
  DOI =          "https://doi.org/10.1109/MSEC.2020.2990230",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 5 14:25:50 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2020:ICSe,
  author =       "Anonymous",
  title =        "{IEEE Computer Society} Call for Papers",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "5",
  pages =        "46--46",
  month =        sep # "\slash " # oct,
  year =         "2020",
  DOI =          "https://doi.org/10.1109/MSEC.2020.3015404",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 5 14:25:50 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Kohlbrenner:2020:BOT,
  author =       "D. Kohlbrenner and S. Shinde and D. Lee and K.
                 Asanovic and D. Song",
  title =        "Building Open Trusted Execution Environments",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "5",
  pages =        "47--56",
  month =        sep # "\slash " # oct,
  year =         "2020",
  DOI =          "https://doi.org/10.1109/MSEC.2020.2990649",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 5 14:25:50 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2020:IIPb,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE IT Professional}}} Call for
                 Articles",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "5",
  pages =        "56--56",
  month =        sep # "\slash " # oct,
  year =         "2020",
  DOI =          "https://doi.org/10.1109/MSEC.2020.3015405",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 5 14:25:50 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Dessouky:2020:GCC,
  author =       "G. Dessouky and T. Frassetto and P. Jauernig and A.
                 -R. Sadeghi and E. Stapf",
  title =        "With Great Complexity Comes Great Vulnerability: From
                 Stand-Alone Fixes to Reconfigurable Security",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "5",
  pages =        "57--66",
  month =        sep # "\slash " # oct,
  year =         "2020",
  DOI =          "https://doi.org/10.1109/MSEC.2020.2994978",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 5 14:25:50 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Borum:2020:PAC,
  author =       "R. Borum and R. Sanders",
  title =        "Preparing {America}'s Cyber Intelligence Workforce",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "5",
  pages =        "67--73",
  month =        sep # "\slash " # oct,
  year =         "2020",
  DOI =          "https://doi.org/10.1109/MSEC.2020.3005035",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 5 14:25:50 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2020:IPCb,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Pervasive Computing}}} Call for
                 Articles",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "5",
  pages =        "73--73",
  month =        sep # "\slash " # oct,
  year =         "2020",
  DOI =          "https://doi.org/10.1109/MSEC.2020.3015406",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 5 14:25:50 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Crowther:2020:BCI,
  author =       "K. G. Crowther and B. Rust",
  title =        "Built-In Cybersecurity: Insights Into Product Security
                 for Cyberphysical Systems at a Large Company",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "5",
  pages =        "74--79",
  month =        sep # "\slash " # oct,
  year =         "2020",
  DOI =          "https://doi.org/10.1109/MSEC.2020.3004961",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 5 14:25:50 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Schneier:2020:HTC,
  author =       "B. Schneier",
  title =        "Hacking the Tax Code",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "5",
  pages =        "79--80",
  month =        sep # "\slash " # oct,
  year =         "2020",
  DOI =          "https://doi.org/10.1109/MSEC.2020.3007049",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 5 14:25:50 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2020:ICSf,
  author =       "Anonymous",
  title =        "{IEEE Computer Society} Information",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "5",
  pages =        "C3--C3",
  month =        sep # "\slash " # oct,
  year =         "2020",
  DOI =          "https://doi.org/10.1109/MSEC.2020.3015400",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 5 14:25:50 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2020:ICEb,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Computing Edge}}} Magazine",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "5",
  pages =        "C4--C4",
  month =        sep # "\slash " # oct,
  year =         "2020",
  DOI =          "https://doi.org/10.1109/MSEC.2020.3015407",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 5 14:25:50 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2020:FCd,
  author =       "Anonymous",
  title =        "Front Cover",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "6",
  pages =        "C1--C1",
  month =        nov # "\slash " # dec,
  year =         "2020",
  DOI =          "https://doi.org/10.1109/MSEC.2020.3019719",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 5 14:25:50 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2020:IOA,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Open Access journal of the Computer
                 Society}}}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "6",
  pages =        "C2--C2",
  month =        nov # "\slash " # dec,
  year =         "2020",
  DOI =          "https://doi.org/10.1109/MSEC.2020.3028710",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 5 14:25:50 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2020:TCf,
  author =       "Anonymous",
  title =        "Table of Contents",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "6",
  pages =        "1--2",
  month =        nov # "\slash " # dec,
  year =         "2020",
  DOI =          "https://doi.org/10.1109/MSEC.2020.3019720",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 5 14:25:50 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2020:Mf,
  author =       "Anonymous",
  title =        "Masthead",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "6",
  pages =        "3--3",
  month =        nov # "\slash " # dec,
  year =         "2020",
  DOI =          "https://doi.org/10.1109/MSEC.2020.3028664",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 5 14:25:50 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Schneck:2020:CDC,
  author =       "P. A. Schneck",
  title =        "Cybersecurity During {COVID-19}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "6",
  pages =        "4--5",
  month =        nov # "\slash " # dec,
  year =         "2020",
  DOI =          "https://doi.org/10.1109/MSEC.2020.3019678",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 5 14:25:50 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2020:RSf,
  author =       "Anonymous",
  title =        "Reliability Society",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "6",
  pages =        "5--5",
  month =        nov # "\slash " # dec,
  year =         "2020",
  DOI =          "https://doi.org/10.1109/MSEC.2020.2981218",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 5 14:25:50 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Hao:2020:EEV,
  author =       "F. Hao and S. Wang and S. Bag and R. Procter and S. F.
                 Shahandashti and M. Mehrnezhad and E. Toreini and R.
                 Metere and L. Y. J. Liu",
  title =        "End-to-End Verifiable E-Voting Trial for Polling
                 Station Voting",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "6",
  pages =        "6--13",
  month =        nov # "\slash " # dec,
  year =         "2020",
  DOI =          "https://doi.org/10.1109/MSEC.2020.3002728",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 5 14:25:50 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Ahmed:2020:COC,
  author =       "C. M. Ahmed and J. Zhou",
  title =        "Challenges and Opportunities in Cyberphysical Systems
                 Security: a Physics-Based Perspective",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "6",
  pages =        "14--22",
  month =        nov # "\slash " # dec,
  year =         "2020",
  DOI =          "https://doi.org/10.1109/MSEC.2020.3002851",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 5 14:25:50 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2020:ICSg,
  author =       "Anonymous",
  title =        "{IEEE Computer Society} Call for Papers",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "6",
  pages =        "22--22",
  month =        nov # "\slash " # dec,
  year =         "2020",
  DOI =          "https://doi.org/10.1109/MSEC.2020.3028711",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 5 14:25:50 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Padilha:2020:FEA,
  author =       "R. Padilha and C. {Mazini Rodrigues} and F. A. Andalo
                 and G. Bertocco and Z. Dias and A. Rocha",
  title =        "Forensic Event Analysis: From Seemingly Unrelated Data
                 to Understanding",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "6",
  pages =        "23--32",
  month =        nov # "\slash " # dec,
  year =         "2020",
  DOI =          "https://doi.org/10.1109/MSEC.2020.3000446",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 5 14:25:50 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Maxion:2020:RBL,
  author =       "R. Maxion",
  title =        "Reproducibility: Buy Low, Sell High",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "6",
  pages =        "33--41",
  month =        nov # "\slash " # dec,
  year =         "2020",
  DOI =          "https://doi.org/10.1109/MSEC.2020.3005077",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 5 14:25:50 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Wang:2020:DCP,
  author =       "Q. -H. Wang and S. M. Miller and R. H. Deng",
  title =        "Driving Cybersecurity Policy Insights From Information
                 on the {Internet}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "6",
  pages =        "42--50",
  month =        nov # "\slash " # dec,
  year =         "2020",
  DOI =          "https://doi.org/10.1109/MSEC.2020.3000765",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 5 14:25:50 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Stevens:2020:ILW,
  author =       "R. Stevens and J. Dykstra and W. {Knox Everette} and
                 M. L. Mazurek",
  title =        "It Lurks Within: a Look at the Unexpected Security
                 Implications of Compliance Programs",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "6",
  pages =        "51--58",
  month =        nov # "\slash " # dec,
  year =         "2020",
  DOI =          "https://doi.org/10.1109/MSEC.2020.3014291",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 5 14:25:50 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Rodriguez:2020:CCI,
  author =       "J. M. Rodriguez and B. J. Allison and C. W. Apsey and
                 T. M. Boudreau",
  title =        "Courseware as Code: Instituting Agile Courseware
                 Collaboration",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "6",
  pages =        "59--62",
  month =        nov # "\slash " # dec,
  year =         "2020",
  DOI =          "https://doi.org/10.1109/MSEC.2020.3004960",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 5 14:25:50 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Bellovin:2020:SPS,
  author =       "S. M. Bellovin",
  title =        "Security, Privacy, and Scale",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "6",
  pages =        "63--64",
  month =        nov # "\slash " # dec,
  year =         "2020",
  DOI =          "https://doi.org/10.1109/MSEC.2020.3019709",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 5 14:25:50 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2020:IIPc,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE IT Professional}}} Call For
                 Articles",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "6",
  pages =        "63--63",
  month =        nov # "\slash " # dec,
  year =         "2020",
  DOI =          "https://doi.org/10.1109/MSEC.2020.3028712",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 5 14:25:50 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2020:ICSh,
  author =       "Anonymous",
  title =        "{IEEE Computer Society} Information",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "6",
  pages =        "C3--C3",
  month =        nov # "\slash " # dec,
  year =         "2020",
  DOI =          "https://doi.org/10.1109/MSEC.2020.3028662",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 5 14:25:50 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2020:ICEc,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Computing Edge}}}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "18",
  number =       "6",
  pages =        "C4--C4",
  month =        nov # "\slash " # dec,
  year =         "2020",
  DOI =          "https://doi.org/10.1109/MSEC.2020.3028713",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 5 14:25:50 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2021:FCa,
  author =       "Anonymous",
  title =        "Front Cover",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "1",
  pages =        "C1--C1",
  month =        jan # "\slash " # feb,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2020.3031993",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 5 14:25:50 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2021:ICEa,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Computing Edge}}}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "1",
  pages =        "C2--C2",
  month =        jan # "\slash " # feb,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2020.3047275",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 5 14:25:50 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2021:TCa,
  author =       "Anonymous",
  title =        "Table of Contents",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "1",
  pages =        "1--2",
  month =        jan # "\slash " # feb,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2020.3031994",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 5 14:25:50 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2021:Ma,
  author =       "Anonymous",
  title =        "Masthead",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "1",
  pages =        "3--3",
  month =        jan # "\slash " # feb,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2020.3031995",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 5 14:25:50 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Peisert:2021:RPP,
  author =       "S. Peisert",
  title =        "Reflections on the Past, Perspectives on the Future
                 [From the Editors]",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "1",
  pages =        "4--7",
  month =        jan # "\slash " # feb,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2020.3034670",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 5 14:25:50 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2021:RSa,
  author =       "Anonymous",
  title =        "Reliability Society",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "1",
  pages =        "7--7",
  month =        jan # "\slash " # feb,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2020.3031996",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 5 14:25:50 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Mohammed:2021:RSP,
  author =       "S. Mohammed and T. -h. Kim and W. C. Fang",
  title =        "Requirements for Security, Privacy, and Trust in the
                 {Internet of Things} [{Guest Editors}' Introduction]",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "1",
  pages =        "8--10",
  month =        jan # "\slash " # feb,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2020.3037624",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 5 14:25:50 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Nicol:2021:MIS,
  author =       "D. M. Nicol",
  title =        "Message from {IEEE S\&P}'s Outgoing {Editor in
                 Chief}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "1",
  pages =        "10--10",
  month =        jan # "\slash " # feb,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2020.3037626",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 5 14:25:50 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2021:SIS,
  author =       "Anonymous",
  title =        "Special Issue on Security and Privacy Issues of Home
                 Globalization",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "1",
  pages =        "11--11",
  month =        jan # "\slash " # feb,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2020.3042444",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 5 14:25:50 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Hernandez-Ramos:2021:SPI,
  author =       "J. L. Hernandez-Ramos and J. A. Martinez and V.
                 Savarino and M. Angelini and V. Napolitano and A. F.
                 Skarmeta and G. Baldini",
  title =        "Security and Privacy in {Internet of Things}-Enabled
                 Smart Cities: Challenges and Future Directions",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "1",
  pages =        "12--23",
  month =        jan # "\slash " # feb,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2020.3012353",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 5 14:25:50 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2021:IAHa,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Annals of the History of
                 Computing}}}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "1",
  pages =        "23--23",
  month =        jan # "\slash " # feb,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2020.3047276",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 5 14:25:50 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Vaidya:2021:SSE,
  author =       "B. Vaidya and H. T. Mouftah",
  title =        "Security for Shared Electric and Automated Mobility
                 Services in Smart Cities",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "1",
  pages =        "24--33",
  month =        jan # "\slash " # feb,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2020.3013759",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 5 14:25:50 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2021:ICGa,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Computer Graphics and
                 Applications}}}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "1",
  pages =        "33--33",
  month =        jan # "\slash " # feb,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2020.3047277",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 5 14:25:50 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Campanile:2021:PRS,
  author =       "L. Campanile and M. Iacono and A. H. Levis and F.
                 Marulli and M. Mastroianni",
  title =        "Privacy Regulations, Smart Roads, Blockchain, and
                 Liability Insurance: Putting Technologies to Work",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "1",
  pages =        "34--43",
  month =        jan # "\slash " # feb,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2020.3012059",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 5 14:25:50 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2021:ICSa,
  author =       "Anonymous",
  title =        "{IEEE Computing Society} Call for Papers",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "1",
  pages =        "43--43",
  month =        jan # "\slash " # feb,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2020.3047278",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 5 14:25:50 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Amit:2021:SHM,
  author =       "G. Amit and A. Shabtai and Y. Elovici",
  title =        "A Self-Healing Mechanism for {Internet of Things}
                 Devices",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "1",
  pages =        "44--53",
  month =        jan # "\slash " # feb,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2020.3013207",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 5 14:25:50 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Massacci:2021:DFE,
  author =       "F. Massacci and C. N. Ngo",
  title =        "Distributed Financial Exchanges: Security Challenges
                 and Design Principles",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "1",
  pages =        "54--64",
  month =        jan # "\slash " # feb,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2020.2994826",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 5 14:25:50 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2021:IIPa,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE IT Professional}}} Call for
                 Articles",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "1",
  pages =        "64--64",
  month =        jan # "\slash " # feb,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2020.3047279",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 5 14:25:50 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{BenNetanel:2021:DSD,
  author =       "R. {Ben Netanel} and B. Nassi and A. Shamir and Y.
                 Elovici",
  title =        "Detecting Spying Drones",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "1",
  pages =        "65--73",
  month =        jan # "\slash " # feb,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2020.3034171",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 5 14:25:50 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2021:IPCa,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Pervasive Computing}}} Call for
                 Articles",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "1",
  pages =        "73--73",
  month =        jan # "\slash " # feb,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2020.3047280",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 5 14:25:50 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Mussington:2021:CRU,
  author =       "D. Mussington",
  title =        "Calculating Risks: Understanding the 2020 Election
                 Experience and Defining the {``New Normal''}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "1",
  pages =        "74--80",
  month =        jan # "\slash " # feb,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2020.3038329",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 5 14:25:50 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2021:ITBa,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Transactions on Big Data}}}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "1",
  pages =        "80--80",
  month =        jan # "\slash " # feb,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2020.3047281",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 5 14:25:50 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Dragoni:2021:WPS,
  author =       "N. Dragoni and A. {Lluch Lafuente} and F. Massacci and
                 A. Schlichtkrull",
  title =        "Are We Preparing Students to Build Security In? {A}
                 Survey of {European} Cybersecurity in Higher Education
                 Programs [Education]",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "1",
  pages =        "81--88",
  month =        jan # "\slash " # feb,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2020.3037446",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 5 14:25:50 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2021:ITSa,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Transactions on Sustainable
                 Computing}}}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "1",
  pages =        "88--88",
  month =        jan # "\slash " # feb,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2020.3047282",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 5 14:25:50 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2021:IOJa,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Open Journal of the Computer
                 Society}}}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "1",
  pages =        "89--89",
  month =        jan # "\slash " # feb,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2020.3047283",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 5 14:25:50 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{SaidElsayed:2021:DCN,
  author =       "M. {Said Elsayed} and N. -A. Le-Khac and A. D.
                 Jurcut",
  title =        "Dealing With {COVID-19} Network Traffic Spikes
                 [Cybercrime and Forensics]",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "1",
  pages =        "90--94",
  month =        jan # "\slash " # feb,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2020.3037448",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 5 14:25:50 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Genkin:2021:WMM,
  author =       "D. Genkin and Y. Yarom",
  title =        "{Whack-a-Meltdown}: Microarchitectural Security Games
                 [Systems Attacks and Defenses]",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "1",
  pages =        "95--98",
  month =        jan # "\slash " # feb,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2020.3036146",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 5 14:25:50 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Hernandez-Ramos:2021:CSC,
  author =       "J. L. Hernandez-Ramos and S. N. Matheu and A.
                 Skarmeta",
  title =        "The Challenges of Software Cybersecurity Certification
                 [Building Security In]",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "1",
  pages =        "99--102",
  month =        jan # "\slash " # feb,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2020.3037845",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 5 14:25:50 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Bertino:2021:AAI,
  author =       "E. Bertino",
  title =        "Attacks on Artificial Intelligence [Last Word]",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "1",
  pages =        "103--104",
  month =        jan # "\slash " # feb,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2020.3037619",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 5 14:25:50 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2021:E,
  author =       "Anonymous",
  title =        "Errata",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "1",
  pages =        "103--103",
  month =        jan # "\slash " # feb,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2020.3040154",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 5 14:25:50 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2021:ICSb,
  author =       "Anonymous",
  title =        "{IEEE Computer Society} Information",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "1",
  pages =        "C3--C3",
  month =        jan # "\slash " # feb,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2020.3031997",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 5 14:25:50 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2021:ICSc,
  author =       "Anonymous",
  title =        "{IEEE Computer Society} Member Benefits",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "1",
  pages =        "C4--C4",
  month =        jan # "\slash " # feb,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2020.3047284",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Feb 5 14:25:50 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2021:FCb,
  author =       "Anonymous",
  title =        "Front Cover",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "2",
  pages =        "C1--C1",
  month =        mar # "\slash " # apr,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2020.3044409",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 26 13:03:32 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2021:ICEb,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Computing Edge}}}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "2",
  pages =        "C2--C2",
  month =        mar # "\slash " # apr,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3060555",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 26 13:03:32 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2021:TCb,
  author =       "Anonymous",
  title =        "Table of Contents",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "2",
  pages =        "1--2",
  month =        mar # "\slash " # apr,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3049672",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 26 13:03:32 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2021:Mb,
  author =       "Anonymous",
  title =        "Masthead",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "2",
  pages =        "3--3",
  month =        mar # "\slash " # apr,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3049754",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 26 13:03:32 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{vanOorschot:2021:TUU,
  author =       "Paul C. van Oorschot",
  title =        "Toward Unseating the Unsafe {C} Programming Language",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "2",
  pages =        "4--6",
  month =        mar # "\slash " # apr,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2020.3048766",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 26 13:03:32 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2021:RSb,
  author =       "Anonymous",
  title =        "{Reliability Society}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "2",
  pages =        "5--5",
  month =        mar # "\slash " # apr,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2020.3044404",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 26 13:03:32 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Peisert:2021:PSI,
  author =       "Sean Peisert and Bruce Schneier and Hamed Okhravi and
                 Fabio Massacci and Terry Benzel and Carl Landwehr and
                 Mohammad Mannan and Jelena Mirkovic and Atul Prakash
                 and James Bret Michael",
  title =        "Perspectives on the {SolarWinds} Incident",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "2",
  pages =        "7--13",
  month =        mar # "\slash " # apr,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3051235",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 26 13:03:32 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2021:ISS,
  author =       "Anonymous",
  title =        "{42nd IEEE Symposium on Security \& Privacy}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "2",
  pages =        "13--13",
  month =        mar # "\slash " # apr,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3060556",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 26 13:03:32 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Massacci:2021:SCP,
  author =       "Fabio Massacci and Trent Jaeger and Sean Peisert",
  title =        "{SolarWinds} and the Challenges of Patching: Can We
                 Ever Stop Dancing With the Devil?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "2",
  pages =        "14--19",
  month =        mar # "\slash " # apr,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3050433",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 26 13:03:32 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Jere:2021:TAF,
  author =       "Malhar S. Jere and Tyler Farnan and Farinaz
                 Koushanfar",
  title =        "A Taxonomy of Attacks on Federated Learning",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "2",
  pages =        "20--28",
  month =        mar # "\slash " # apr,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2020.3039941",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 26 13:03:32 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2021:IAHb,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Annals of the History Computing}}}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "2",
  pages =        "28--28",
  month =        mar # "\slash " # apr,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3060557",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 26 13:03:32 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Herzberg:2021:SMA,
  author =       "Amir Herzberg and Hemi Leibowitz and Kent Seamons and
                 Elham Vaziripour and Justin Wu and Daniel Zappala",
  title =        "Secure Messaging Authentication Ceremonies Are
                 Broken",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "2",
  pages =        "29--37",
  month =        mar # "\slash " # apr,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2020.3039727",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 26 13:03:32 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Ahmad:2021:SAT,
  author =       "Wajeeha Ahmad and David D. Clark",
  title =        "A Systems Approach Toward Addressing Anonymous Abuses:
                 Technical and Policy Considerations",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "2",
  pages =        "38--47",
  month =        mar # "\slash " # apr,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2020.3046708",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 26 13:03:32 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2021:ICGb,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Computer Graphics \&
                 Applications}}}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "2",
  pages =        "47--47",
  month =        mar # "\slash " # apr,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3060558",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 26 13:03:32 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Hussain:2021:FSF,
  author =       "Siam U. Hussain and M. Sadegh Riazi and Farinaz
                 Koushanfar",
  title =        "The Fusion of Secure Function Evaluation and Logic
                 Synthesis",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "2",
  pages =        "48--55",
  month =        mar # "\slash " # apr,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2020.3049062",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 26 13:03:32 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Sanzo:2021:DKC,
  author =       "Karen L. Sanzo and Jay Paredes Scribner and Hongyi
                 Wu",
  title =        "Designing a {K-16} Cybersecurity Collaborative:
                 {CIPHER}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "2",
  pages =        "56--59",
  month =        mar # "\slash " # apr,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3050246",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 26 13:03:32 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Simioni:2021:ITA,
  author =       "Marco Simioni",
  title =        "Investigative Techniques for the De-Anonymization of
                 Hidden Services",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "2",
  pages =        "60--64",
  month =        mar # "\slash " # apr,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3050245",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 26 13:03:32 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{King:2021:CCF,
  author =       "Samuel T. King and Nolen Scaife and Patrick Traynor
                 and Zainul Abi Din and Christian Peeters and Hari
                 Venugopala",
  title =        "Credit Card Fraud Is a Computer Security Problem",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "2",
  pages =        "65--69",
  month =        mar # "\slash " # apr,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3050247",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 26 13:03:32 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2021:IIPb,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE IT Professional}}} Call for
                 Articles",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "2",
  pages =        "69--69",
  month =        mar # "\slash " # apr,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3060559",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 26 13:03:32 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Menezes:2021:CC,
  author =       "Alfred Menezes and Douglas Stebila",
  title =        "Challenges in Cryptography",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "2",
  pages =        "70--73",
  month =        mar # "\slash " # apr,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3049730",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 26 13:03:32 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2020.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2021:IPCb,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Pervasive Computing}}} Call for
                 Articles",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "2",
  pages =        "73--73",
  month =        mar # "\slash " # apr,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3060560",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 26 13:03:32 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Spring:2021:TCC,
  author =       "Jonathan Spring and Eric Hatleback and Allen
                 Householder and Art Manion and Deana Shick",
  title =        "Time to Change the {CVSS}?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "2",
  pages =        "74--78",
  month =        mar # "\slash " # apr,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2020.3044475",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 26 13:03:32 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2021:ITC,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Transactions on Computers}}} Call
                 for Papers",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "2",
  pages =        "78--78",
  month =        mar # "\slash " # apr,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3060561",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 26 13:03:32 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Geer:2021:AUC,
  author =       "Daniel E. Geer",
  title =        "Auto-Update Considered Harmful",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "2",
  pages =        "79--80",
  month =        mar # "\slash " # apr,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3050248",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 26 13:03:32 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2021:ITSb,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Transactions on Sustainable
                 Computing}}}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "2",
  pages =        "79--79",
  month =        mar # "\slash " # apr,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3060562",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 26 13:03:32 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2021:ICSd,
  author =       "Anonymous",
  title =        "{IEEE Computer Society} Information",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "2",
  pages =        "C3--C3",
  month =        mar # "\slash " # apr,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3049755",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 26 13:03:32 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2021:ICSe,
  author =       "Anonymous",
  title =        "{IEEE Computer Society} Member Benefits",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "2",
  pages =        "C4--C4",
  month =        mar # "\slash " # apr,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3060563",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 26 13:03:32 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2021:FCc,
  author =       "Anonymous",
  title =        "[{Front} cover]",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "3",
  pages =        "C1--C1",
  month =        may # "\slash " # jun,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3055043",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 26 13:03:32 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2021:ICEc,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Computing Edge}}} [advertisement]",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "3",
  pages =        "C2--C2",
  month =        may # "\slash " # jun,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3074222",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 26 13:03:32 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2021:TCc,
  author =       "Anonymous",
  title =        "Table of contents",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "3",
  pages =        "1--2",
  month =        may # "\slash " # jun,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3055044",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 26 13:03:32 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2021:Mc,
  author =       "Anonymous",
  title =        "Masthead",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "3",
  pages =        "3--3",
  month =        may # "\slash " # jun,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3055045",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 26 13:03:32 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Williams:2021:PWL,
  author =       "Laurie Williams",
  title =        "The People Who Live in Glass Houses Are Happy the
                 Stones Weren't Thrown at Them [From the {Editors}]",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "3",
  pages =        "4--7",
  month =        may # "\slash " # jun,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3065723",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 26 13:03:32 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2021:RSc,
  author =       "Anonymous",
  title =        "{Reliability Society}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "3",
  pages =        "5--5",
  month =        may # "\slash " # jun,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2020.3044405",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 26 13:03:32 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2021:IAHc,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Annals of the History of
                 Computing}}} [advertisement]",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "3",
  pages =        "7--7",
  month =        may # "\slash " # jun,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3074223",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 26 13:03:32 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Okhravi:2021:CM,
  author =       "Hamed Okhravi",
  title =        "A Cybersecurity Moonshot",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "3",
  pages =        "8--16",
  month =        may # "\slash " # jun,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3059438",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 26 13:03:32 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Ali:2021:WWH,
  author =       "Sameed Ali and Prashant Anantharaman and Zephyr Lucas
                 and Sean W. Smith",
  title =        "What We Have Here Is Failure to Validate: Summer of
                 {LangSec}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "3",
  pages =        "17--23",
  month =        may # "\slash " # jun,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3059167",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 26 13:03:32 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Nicol:2021:RTE,
  author =       "David M. Nicol",
  title =        "The Ransomware Threat to Energy-Delivery Systems",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "3",
  pages =        "24--32",
  month =        may # "\slash " # jun,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3063678",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 26 13:03:32 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Rahman:2021:DKS,
  author =       "Akond Rahman and Laurie Williams",
  title =        "Different Kind of Smells: Security Smells in
                 Infrastructure as Code Scripts",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "3",
  pages =        "33--41",
  month =        may # "\slash " # jun,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3065190",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 26 13:03:32 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Deng:2021:UIP,
  author =       "Shuwen Deng and Wenjie Xiong and Jakub Szefer",
  title =        "Understanding the Insecurity of Processor Caches Due
                 to Cache Timing-Based Vulnerabilities",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "3",
  pages =        "42--49",
  month =        may # "\slash " # jun,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3055799",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 26 13:03:32 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2021:IJ,
  author =       "Anonymous",
  title =        "{IEEE JobBoards}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "3",
  pages =        "50--50",
  month =        may # "\slash " # jun,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3074224",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 26 13:03:32 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Park:2021:PTC,
  author =       "Sangchul Park and Gina J. Choi and Haksoo Ko",
  title =        "Privacy in the Time of {COVID-19}: Divergent Paths for
                 Contact Tracing and Route-Disclosure Mechanisms in
                 {South Korea}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "3",
  pages =        "51--56",
  month =        may # "\slash " # jun,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3066024",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 26 13:03:32 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2021:IOJb,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Open Journal of the Computer
                 Society}}}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "3",
  pages =        "57--57",
  month =        may # "\slash " # jun,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3074225",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 26 13:03:32 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Massacci:2021:TLD,
  author =       "Fabio Massacci and Ivan Pashchenko",
  title =        "Technical Leverage: Dependencies Are a Mixed
                 Blessing",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "3",
  pages =        "58--62",
  month =        may # "\slash " # jun,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3065627",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 26 13:03:32 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2021:ETA,
  author =       "Anonymous",
  title =        "Erratum [for {``A Taxonomy of Attacks on Federated
                 Learning''}]",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "3",
  pages =        "62--62",
  month =        may # "\slash " # jun,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3065793",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 26 13:03:32 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2021:ICSf,
  author =       "Anonymous",
  title =        "{IEEE Computer Society} Call for Papers",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "3",
  pages =        "63--63",
  month =        may # "\slash " # jun,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3074226",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 26 13:03:32 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Schneier:2021:WWI,
  author =       "Bruce Schneier",
  title =        "What Will It Take?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "3",
  pages =        "63--64",
  month =        may # "\slash " # jun,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3063800",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 26 13:03:32 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2021:ICSg,
  author =       "Anonymous",
  title =        "{IEEE Computer Society} Information",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "3",
  pages =        "C3--C3",
  month =        may # "\slash " # jun,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3055046",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 26 13:03:32 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2021:ICSh,
  author =       "Anonymous",
  title =        "{IEEE Computer Society} Member Benefits",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "3",
  pages =        "C4--C4",
  month =        may # "\slash " # jun,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3074227",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed May 26 13:03:32 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2021:FCd,
  author =       "Anonymous",
  title =        "[{Front} cover]",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "4",
  pages =        "C1--C1",
  month =        jul # "\slash " # aug,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3075632",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 27 18:42:45 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2021:ICEd,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Computing Edge}}}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "4",
  pages =        "C2--C2",
  month =        jul # "\slash " # aug,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3087856",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 27 18:42:45 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2021:TCd,
  author =       "Anonymous",
  title =        "Table of Contents",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "4",
  pages =        "1--2",
  month =        jul # "\slash " # aug,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3075633",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 27 18:42:45 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2021:Md,
  author =       "Anonymous",
  title =        "Masthead",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "4",
  pages =        "3--3",
  month =        jul # "\slash " # aug,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3075634",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 27 18:42:45 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Michael:2021:SPE,
  author =       "James Bret Michael",
  title =        "Security and Privacy for Edge Artificial
                 Intelligence",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "4",
  pages =        "4--7",
  month =        jul # "\slash " # aug,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3078304",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 27 18:42:45 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2021:RSd,
  author =       "Anonymous",
  title =        "Reliability Society",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "4",
  pages =        "5--5",
  month =        jul # "\slash " # aug,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2020.3044406",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 27 18:42:45 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Benaloh:2021:VSR,
  author =       "Josh Benaloh and Kammi Foote and Philip B. Stark and
                 Vanessa Teague and Dan S. Wallach",
  title =        "{VAULT}-Style Risk-Limiting Audits and the {Inyo
                 County Pilot}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "4",
  pages =        "8--18",
  month =        jul # "\slash " # aug,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3075107",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 27 18:42:45 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{DeCristofaro:2021:COP,
  author =       "Emiliano {De Cristofaro}",
  title =        "A Critical Overview of Privacy in Machine Learning",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "4",
  pages =        "19--27",
  month =        jul # "\slash " # aug,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3076443",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 27 18:42:45 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Dettmer:2021:LLD,
  author =       "Amy Dettmer and Hamed Okhravi and Kevin Perry and
                 Nabil Schear and Richard Shay and Mary Ellen Zurko and
                 Paula Donovan",
  title =        "Lessons Learned From Designing a Security Architecture
                 for Real-World Government Agencies",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "4",
  pages =        "28--36",
  month =        jul # "\slash " # aug,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3069995",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 27 18:42:45 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Ruan:2021:PCC,
  author =       "Wenqiang Ruan and Mingxin Xu and Haoyang Jia and
                 Zhenhuan Wu and LuShan Song and Weili Han",
  title =        "Privacy Compliance: Can Technology Come to the
                 Rescue?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "4",
  pages =        "37--43",
  month =        jul # "\slash " # aug,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3078218",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 27 18:42:45 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Boechat:2021:VRC,
  author =       "Fran{\c{c}}ois Boechat and Gabriel Ribas and Lucas
                 Senos and Miguel Bicudo and Mateus Schulz Nogueira and
                 Leandro Pfleger de Aguiar and Daniel Sadoc Menasche",
  title =        "Is Vulnerability Report Confidence Redundant?
                 {Pitfalls} Using Temporal Risk Scores",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "4",
  pages =        "44--53",
  month =        jul # "\slash " # aug,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3070978",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 27 18:42:45 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2021:ICSi,
  author =       "Anonymous",
  title =        "{IEEE Computer Society} Call For Papers",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "4",
  pages =        "53--53",
  month =        jul # "\slash " # aug,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3087875",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 27 18:42:45 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Haney:2021:CAF,
  author =       "Julie Haney and Wayne Lutters and Jody Jacobs",
  title =        "Cybersecurity Advocates: Force Multipliers in Security
                 Behavior Change",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "4",
  pages =        "54--59",
  month =        jul # "\slash " # aug,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3077405",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 27 18:42:45 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Menezes:2021:EES,
  author =       "Alfred Menezes and Douglas Stebila",
  title =        "End-to-End Security: When Do We Have It?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "4",
  pages =        "60--64",
  month =        jul # "\slash " # aug,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3077403",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 27 18:42:45 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2021:ICSj,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Computing in Science and
                 Engineering}}}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "4",
  pages =        "64--64",
  month =        jul # "\slash " # aug,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3087876",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 27 18:42:45 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Sanderson:2021:BPH,
  author =       "Pollyanna Sanderson",
  title =        "Balancing Public Health and Civil Liberties: Privacy
                 Aspects of Contact-Tracing Technologies",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "4",
  pages =        "65--69",
  month =        jul # "\slash " # aug,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3077785",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 27 18:42:45 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2021:IAHd,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Annals of the History of
                 Computing}}}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "4",
  pages =        "69--69",
  month =        jul # "\slash " # aug,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3087878",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 27 18:42:45 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Vetillard:2021:SCI,
  author =       "Eric V{\'e}tillard",
  title =        "Security Certification: Is It Box Ticking?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "4",
  pages =        "70--74",
  month =        jul # "\slash " # aug,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3077401",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 27 18:42:45 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2021:IOJc,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Open Journal of the Computer
                 Society}}}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "4",
  pages =        "75--75",
  month =        jul # "\slash " # aug,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3087881",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 27 18:42:45 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Bellovin:2021:LLH,
  author =       "Steven M. Bellovin",
  title =        "The Law and Lawful Hacking",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "4",
  pages =        "76--76",
  month =        jul # "\slash " # aug,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3077374",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 27 18:42:45 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2021:ICSk,
  author =       "Anonymous",
  title =        "{IEEE Computer Society} Information",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "4",
  pages =        "C3--C3",
  month =        jul # "\slash " # aug,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3076233",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 27 18:42:45 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2021:ICSl,
  author =       "Anonymous",
  title =        "{IEEE Computer Society} Member Benefits",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "4",
  pages =        "C4--C4",
  month =        jul # "\slash " # aug,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3087884",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jul 27 18:42:45 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2021:FCe,
  author =       "Anonymous",
  title =        "Front Cover",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "5",
  pages =        "C1--C1",
  month =        sep # "\slash " # oct,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3101385",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Oct 15 12:52:53 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2021:ICSm,
  author =       "Anonymous",
  title =        "{IEEE Computer Society} Elections",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "5",
  pages =        "C2--C2",
  month =        sep # "\slash " # oct,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3103617",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Oct 15 12:52:53 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2021:TCe,
  author =       "Anonymous",
  title =        "Table of Contents",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "5",
  pages =        "1--2",
  month =        sep # "\slash " # oct,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3087879",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Oct 15 12:52:53 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2021:Me,
  author =       "Anonymous",
  title =        "Masthead",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "5",
  pages =        "3--3",
  month =        sep # "\slash " # oct,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3087880",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Oct 15 12:52:53 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Benzel:2021:RIP,
  author =       "Terry Benzel",
  title =        "Research and Industry Partnerships in Cybersecurity
                 and Privacy Research: New Frontiers or Fueling the Tech
                 Sector?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "5",
  pages =        "4--7",
  month =        sep # "\slash " # oct,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3094313",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Oct 15 12:52:53 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2021:RSe,
  author =       "Anonymous",
  title =        "Reliability Society",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "5",
  pages =        "5--5",
  month =        sep # "\slash " # oct,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2020.3044407",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Oct 15 12:52:53 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2021:UIS,
  author =       "Anonymous",
  title =        "Updates From {{\booktitle{IEEE Security \&
                 Privacy}}}'s {Editor in Chief Sean Peisert}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "5",
  pages =        "8--8",
  month =        sep # "\slash " # oct,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3094368",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Oct 15 12:52:53 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Blakley:2021:DPH,
  author =       "Bob Blakley and Lorrie Cranor",
  title =        "A Discussion of Public Health, Trust, and Privacy With
                 {Susan Landau}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "5",
  pages =        "9--15",
  month =        sep # "\slash " # oct,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3092956",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Oct 15 12:52:53 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2021:IAHe,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Annals of the History of
                 Computing}}}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "5",
  pages =        "15--15",
  month =        sep # "\slash " # oct,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3103618",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Oct 15 12:52:53 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Lee:2021:DAS,
  author =       "Yu-Tsung Lee and Haining Chen and Trent Jaeger",
  title =        "Demystifying {Android}'s Scoped Storage Defense",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "5",
  pages =        "16--25",
  month =        sep # "\slash " # oct,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3090564",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Oct 15 12:52:53 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2021:ICSn,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Computing in Science \&
                 Engineering}}}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "5",
  pages =        "25--25",
  month =        sep # "\slash " # oct,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3103619",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Oct 15 12:52:53 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Trestian:2021:PTC,
  author =       "Ramona Trestian and Guodong Xie and Pintu Lohar and
                 Edoardo Celeste and Malika Bendechache and Rob Brennan
                 and Evgeniia Jayasekera and Regina Connolly and Irina
                 Tal",
  title =        "Privacy in a Time of {COVID-19}: How Concerned Are
                 You?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "5",
  pages =        "26--35",
  month =        sep # "\slash " # oct,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3092607",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Oct 15 12:52:53 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Skopik:2021:SGP,
  author =       "Florian Skopik and Markus Wurzenberger and Max
                 Landauer",
  title =        "The Seven Golden Principles of Effective Anomaly-Based
                 Intrusion Detection",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "5",
  pages =        "36--45",
  month =        sep # "\slash " # oct,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3090444",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Oct 15 12:52:53 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2021:IIPc,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE IT Professional}}} Call for
                 Articles",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "5",
  pages =        "45--45",
  month =        sep # "\slash " # oct,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3103620",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Oct 15 12:52:53 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Minna:2021:USI,
  author =       "Francesco Minna and Agathe Blaise and Filippo Rebecchi
                 and Balakrishnan Chandrasekaran and Fabio Massacci",
  title =        "Understanding the Security Implications of
                 {Kubernetes} Networking",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "5",
  pages =        "46--56",
  month =        sep # "\slash " # oct,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3094726",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Oct 15 12:52:53 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Yang:2021:OCS,
  author =       "Zheng Yang and Sridhar Adepu and Jianying Zhou",
  title =        "Opportunities and Challenges in Securing Critical
                 Infrastructures Through Cryptography",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "5",
  pages =        "57--65",
  month =        sep # "\slash " # oct,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3090022",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Oct 15 12:52:53 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2020.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Das:2021:PPE,
  author =       "Sauvik Das and W. Keith Edwards and DeBrae
                 Kennedy-Mayo and Peter Swire and Yuxi Wu",
  title =        "Privacy for the People? {Exploring} Collective Action
                 as a Mechanism to Shift Power to Consumers in End-User
                 Privacy",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "5",
  pages =        "66--70",
  month =        sep # "\slash " # oct,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3093135",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Oct 15 12:52:53 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2021:ICEe,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Computing Edge}}}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "5",
  pages =        "71--71",
  month =        sep # "\slash " # oct,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3103621",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Oct 15 12:52:53 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Taylor:2021:CDS,
  author =       "Blair Taylor and Sidd Kaza and Paige A. Zaleppa",
  title =        "{CLARK}: A Design Science Research Project for
                 Building and Sharing High-Quality Cybersecurity
                 Curricula",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "5",
  pages =        "72--76",
  month =        sep # "\slash " # oct,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3093136",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Oct 15 12:52:53 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2021:IOJd,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Open Journal of the Computer
                 Society}}}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "5",
  pages =        "77--77",
  month =        sep # "\slash " # oct,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3103622",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Oct 15 12:52:53 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Tuma:2021:SPP,
  author =       "Katja Tuma and Mathias Widman",
  title =        "Seven Pain Points of Threat Analysis and Risk
                 Assessment in the Automotive Domain",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "5",
  pages =        "78--82",
  month =        sep # "\slash " # oct,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3093137",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Oct 15 12:52:53 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{vanOorschot:2021:CSB,
  author =       "Paul C. van Oorschot",
  title =        "Coevolution of Security's Body of Knowledge and
                 Curricula",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "5",
  pages =        "83--89",
  month =        sep # "\slash " # oct,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3093735",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Oct 15 12:52:53 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2021:ICSo,
  author =       "Anonymous",
  title =        "{IEEE Computer Society} Call for Papers",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "5",
  pages =        "89--89",
  month =        sep # "\slash " # oct,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3103623",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Oct 15 12:52:53 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Stalla-Bourdillon:2021:MSD,
  author =       "Sophie Stalla-Bourdillon",
  title =        "A Maturity Spectrum for Data Institutions",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "5",
  pages =        "90--94",
  month =        sep # "\slash " # oct,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3094985",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Oct 15 12:52:53 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Bertino:2021:ZTA,
  author =       "Elisa Bertino",
  title =        "Zero Trust Architecture: Does It Help?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "5",
  pages =        "95--96",
  month =        sep # "\slash " # oct,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3091195",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Oct 15 12:52:53 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2021:ITSc,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Transactions on Sustainable
                 Computing}}}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "5",
  pages =        "95--95",
  month =        sep # "\slash " # oct,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3103624",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Oct 15 12:52:53 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2021:ICSp,
  author =       "Anonymous",
  title =        "{IEEE Computer Society} Information",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "5",
  pages =        "C3--C3",
  month =        sep # "\slash " # oct,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3102459",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Oct 15 12:52:53 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2021:ICSq,
  author =       "Anonymous",
  title =        "{IEEE Computer Society} Member Benefits",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "5",
  pages =        "C4--C4",
  month =        sep # "\slash " # oct,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3103625",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Fri Oct 15 12:52:53 2021",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2021:FCf,
  author =       "Anonymous",
  title =        "Front Cover",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "6",
  pages =        "C1--C1",
  month =        nov # "\slash " # dec,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3078204",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jan 31 15:37:00 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2021:ICEf,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Computing Edge}}}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "6",
  pages =        "C2--C2",
  month =        nov # "\slash " # dec,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3117321",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jan 31 15:37:00 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2021:TCf,
  author =       "Anonymous",
  title =        "Table of Contents",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "6",
  pages =        "1--2",
  month =        nov # "\slash " # dec,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3078205",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jan 31 15:37:00 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2021:Mf,
  author =       "Anonymous",
  title =        "Masthead",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "6",
  pages =        "3--3",
  month =        nov # "\slash " # dec,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3078206",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jan 31 15:37:00 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2021:TFS,
  author =       "Anonymous",
  title =        "Toward Fail Safety for Security Decisions",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "6",
  pages =        "4--7",
  month =        nov # "\slash " # dec,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3096614",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jan 31 15:37:00 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2021:RSf,
  author =       "Anonymous",
  title =        "{Reliability Society}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "6",
  pages =        "5--5",
  month =        nov # "\slash " # dec,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2020.3044408",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jan 31 15:37:00 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2021:IAHf,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Annals of the History of
                 Computing}}}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "6",
  pages =        "7--7",
  month =        nov # "\slash " # dec,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3117322",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jan 31 15:37:00 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Cunningham:2021:RRM,
  author =       "Robert Cunningham and Anita D. Carleton and Tom
                 Longstaff and Forrest J. Shull",
  title =        "A Research Road Map for Building Secure and Resilient
                 Software-Intensive Systems",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "6",
  pages =        "8--14",
  month =        nov # "\slash " # dec,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3105876",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jan 31 15:37:00 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2021:ICGc,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Computer Graphics \&
                 Applications}}}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "6",
  pages =        "14--14",
  month =        nov # "\slash " # dec,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3117323",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jan 31 15:37:00 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2021:DES,
  author =       "Anonymous",
  title =        "A Discussion of Election Security, Cryptography, and
                 Exceptional Access With {Michael Alan Specter}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "6",
  pages =        "15--22",
  month =        nov # "\slash " # dec,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3107769",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jan 31 15:37:00 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2020.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Yao:2021:AFQ,
  author =       "Danfeng Daphne Yao and Terry Benzel",
  title =        "{ACSAC 2020}: Furthering the Quest to Tackle Hard
                 Problems and Find Practical Solutions",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "6",
  pages =        "23--24",
  month =        nov # "\slash " # dec,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3106595",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jan 31 15:37:00 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2021:ICSr,
  author =       "Anonymous",
  title =        "{IEEE Computer Society Diversity and Integrity Fund}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "6",
  pages =        "25--25",
  month =        nov # "\slash " # dec,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3117324",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jan 31 15:37:00 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Kim:2021:ELS,
  author =       "Dongkwan Kim and Eunsoo Kim and Mingeun Kim and
                 Yeongjin Jang and Yongdae Kim",
  title =        "Enabling the Large-Scale Emulation of {Internet of
                 Things} Firmware With Heuristic Workarounds",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "6",
  pages =        "26--35",
  month =        nov # "\slash " # dec,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3076226",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jan 31 15:37:00 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Ali:2021:PCS,
  author =       "Suzan Ali and Mounir Elgharabawy and Quentin
                 Duchaussoy and Mohammad Mannan and Amr Youssef",
  title =        "Parental Controls: Safer {Internet} Solutions or New
                 Pitfalls?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "6",
  pages =        "36--46",
  month =        nov # "\slash " # dec,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3076150",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jan 31 15:37:00 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Wiefling:2021:VYH,
  author =       "Stephan Wiefling and Markus D{\"u}rmuth and Luigi {Lo
                 Iacono}",
  title =        "Verify It's You: How Users Perceive Risk-Based
                 Authentication",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "6",
  pages =        "47--57",
  month =        nov # "\slash " # dec,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3077954",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jan 31 15:37:00 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Yagemann:2021:MLS,
  author =       "Carter Yagemann and Pak Ho Chung and Erkam Uzun and
                 Sai Ragam and Brendan Saltaformaggio and Wenke Lee",
  title =        "Modeling Large-Scale Manipulation in Open Stock
                 Markets",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "6",
  pages =        "58--65",
  month =        nov # "\slash " # dec,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3076717",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jan 31 15:37:00 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Liao:2021:PPP,
  author =       "Song Liao and Christin Wilson and Cheng Long and
                 Hongxin Hu and Huixing Deng",
  title =        "Problematic Privacy Policies of Voice Assistant
                 Applications",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "6",
  pages =        "66--73",
  month =        nov # "\slash " # dec,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3082474",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jan 31 15:37:00 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Gueye:2021:DRS,
  author =       "Assane Gueye and Carlos E. C. Galhardo and Irena
                 Bojanova and Peter Mell",
  title =        "A Decade of Reoccurring Software Weaknesses",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "6",
  pages =        "74--82",
  month =        nov # "\slash " # dec,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3082757",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jan 31 15:37:00 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Shi:2021:AVC,
  author =       "Cong Shi and Yan Wang and Yingying Jennifer Chen and
                 Nitesh Saxena",
  title =        "Authentication of Voice Commands by Leveraging
                 Vibrations in Wearables",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "6",
  pages =        "83--92",
  month =        nov # "\slash " # dec,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3077205",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jan 31 15:37:00 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2021:ICSs,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Computing in Science and
                 Engineering}}}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "6",
  pages =        "92--92",
  month =        nov # "\slash " # dec,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3117325",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jan 31 15:37:00 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Pujol:2021:EPM,
  author =       "David Pujol and Ashwin Machanavajjhala",
  title =        "Equity and Privacy: More Than Just a Tradeoff",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "6",
  pages =        "93--97",
  month =        nov # "\slash " # dec,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3105773",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jan 31 15:37:00 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2021:ICSt,
  author =       "Anonymous",
  title =        "{IEEE Computer Society} Call for Papers",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "6",
  pages =        "97--97",
  month =        nov # "\slash " # dec,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3117326",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jan 31 15:37:00 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Menezes:2021:AES,
  author =       "Alfred Menezes and Douglas Stebila",
  title =        "The {Advanced Encryption Standard}: 20 Years Later",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "6",
  pages =        "98--102",
  month =        nov # "\slash " # dec,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3107078",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jan 31 15:37:00 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2020.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2021:IIPd,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE IT Professional}}} Call for
                 Articles",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "6",
  pages =        "102--102",
  month =        nov # "\slash " # dec,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3117327",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jan 31 15:37:00 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2021:IOJe,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Open Journal of the Computer
                 Society}}}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "6",
  pages =        "103--103",
  month =        nov # "\slash " # dec,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3117328",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jan 31 15:37:00 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Farahmand:2021:ICA,
  author =       "Fariborz Farahmand",
  title =        "Integrating Cybersecurity and Artificial Intelligence
                 Research in Engineering and Computer Science
                 Education",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "6",
  pages =        "104--110",
  month =        nov # "\slash " # dec,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3103460",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jan 31 15:37:00 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2021:IPCc,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Pervasive Computing}}} Call for
                 Articles",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "6",
  pages =        "110--110",
  month =        nov # "\slash " # dec,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3117329",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jan 31 15:37:00 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2021:ICSu,
  author =       "Anonymous",
  title =        "{IEEE Computer Society} Member Benefits",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "6",
  pages =        "111--111",
  month =        nov # "\slash " # dec,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3117330",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jan 31 15:37:00 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Stark:2021:CTG,
  author =       "Emily Stark and Joe DeBlasio and Devon O Brien",
  title =        "Certificate Transparency in {Google Chrome}: Past,
                 Present, and Future",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "6",
  pages =        "112--118",
  month =        nov # "\slash " # dec,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3103461",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jan 31 15:37:00 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2021:ISP,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Security and Privacy}}}
                 Subscription",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "6",
  pages =        "118--118",
  month =        nov # "\slash " # dec,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3117331",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jan 31 15:37:00 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Polonetsky:2021:RPE,
  author =       "Jules Polonetsky and Tim Sparapani",
  title =        "A Review of the Privacy-Enhancing Technologies
                 Software Market",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "6",
  pages =        "119--122",
  month =        nov # "\slash " # dec,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3108295",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jan 31 15:37:00 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2021:ITBb,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Transactions on Big Data}}}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "6",
  pages =        "123--123",
  month =        nov # "\slash " # dec,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3117332",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jan 31 15:37:00 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Geer:2021:C,
  author =       "Daniel E. Geer",
  title =        "Convergence",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "6",
  pages =        "123--124",
  month =        nov # "\slash " # dec,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3106594",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jan 31 15:37:00 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2021:ICSv,
  author =       "Anonymous",
  title =        "{IEEE Computer Society} Information",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "6",
  pages =        "C3--C3",
  month =        nov # "\slash " # dec,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3078207",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jan 31 15:37:00 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2021:IJB,
  author =       "Anonymous",
  title =        "{IEEE Job Boards}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "19",
  number =       "6",
  pages =        "C4--C4",
  month =        nov # "\slash " # dec,
  year =         "2021",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3117333",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jan 31 15:37:00 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2022:FCa,
  author =       "Anonymous",
  title =        "[{Front} cover]",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "1",
  pages =        "C1--C1",
  month =        jan # "\slash " # feb,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3118933",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jan 31 15:37:00 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2022:ICEa,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Computing Edge}}}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "1",
  pages =        "C2--C2",
  month =        jan # "\slash " # feb,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3136937",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jan 31 15:37:00 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2022:TCa,
  author =       "Anonymous",
  title =        "Table of Contents",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "1",
  pages =        "1--2",
  month =        jan # "\slash " # feb,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3118934",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jan 31 15:37:00 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2022:Ma,
  author =       "Anonymous",
  title =        "Masthead",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "1",
  pages =        "3--3",
  month =        jan # "\slash " # feb,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3137107",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jan 31 15:37:00 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Peisert:2022:UCS,
  author =       "Sean Peisert",
  title =        "Unsafe at Any Clock Speed: The Insecurity of Computer
                 System Design, Implementation, and Operation",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "1",
  pages =        "4--9",
  month =        jan # "\slash " # feb,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3127086",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jan 31 15:37:00 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2022:RSa,
  author =       "Anonymous",
  title =        "{Reliability Society}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "1",
  pages =        "5--5",
  month =        jan # "\slash " # feb,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3118955",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jan 31 15:37:00 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Caviglione:2022:SPI,
  author =       "Luca Caviglione and Steffen Wendzel and Simon Vrhovec
                 and Aleksandra Mileva",
  title =        "Security and Privacy Issues of Home Globalization",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "1",
  pages =        "10--11",
  month =        jan # "\slash " # feb,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3127372",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jan 31 15:37:00 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Shanmugarasa:2022:APP,
  author =       "Yashothara Shanmugarasa and Hye-young Paik and Salil
                 S. Kanhere and Liming Zhu",
  title =        "Automated Privacy Preferences for Smart Home Data
                 Sharing Using Personal Data Stores",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "1",
  pages =        "12--22",
  month =        jan # "\slash " # feb,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3106056",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jan 31 15:37:00 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2022:ICSa,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Computing in Science and
                 Engineering}}}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "1",
  pages =        "22--22",
  month =        jan # "\slash " # feb,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3136969",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jan 31 15:37:00 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Rios:2022:PIP,
  author =       "Ruben Rios and Jose A. Onieva and Rodrigo Roman and
                 Javier Lopez",
  title =        "Personal {IoT} Privacy Control at the Edge",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "1",
  pages =        "23--32",
  month =        jan # "\slash " # feb,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3101865",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jan 31 15:37:00 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2022:ICSb,
  author =       "Anonymous",
  title =        "{IEEE Computer Society} Member Benefits",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "1",
  pages =        "32--32",
  month =        jan # "\slash " # feb,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3136970",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jan 31 15:37:00 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Ardito:2022:PPG,
  author =       "Luca Ardito and Luca Barbato and Paolo Mori and Andrea
                 Saracino",
  title =        "Preserving Privacy in the Globalized Smart Home: The
                 {SIFIS-Home Project}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "1",
  pages =        "33--44",
  month =        jan # "\slash " # feb,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3118561",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jan 31 15:37:00 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Bringhenti:2022:TCP,
  author =       "Daniele Bringhenti and Fulvio Valenza and Cataldo
                 Basile",
  title =        "Toward Cybersecurity Personalization in Smart Homes",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "1",
  pages =        "45--53",
  month =        jan # "\slash " # feb,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3117471",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jan 31 15:37:00 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Li:2022:CCB,
  author =       "Ying Li and Tong Xin and Mikko Siponen",
  title =        "Citizens Cybersecurity Behavior: Some Major
                 Challenges",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "1",
  pages =        "54--61",
  month =        jan # "\slash " # feb,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3117371",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jan 31 15:37:00 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2022:ICSc,
  author =       "Anonymous",
  title =        "{IEEE Computer Society} Call for Papers",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "1",
  pages =        "61--61",
  month =        jan # "\slash " # feb,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3136971",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jan 31 15:37:00 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Mihelic:2022:SSD,
  author =       "An{\v{z}}e Miheli{\v{c}} and Bo{\v{s}}tjan
                 {\v{Z}}vanut",
  title =        "{(In)secure} Smart Device Use Among Senior Citizens",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "1",
  pages =        "62--71",
  month =        jan # "\slash " # feb,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3113726",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jan 31 15:37:00 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2022:IIPa,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE IT Professional}}} Call for
                 Articles",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "1",
  pages =        "71--71",
  month =        jan # "\slash " # feb,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3136972",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jan 31 15:37:00 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Bugeja:2022:ESH,
  author =       "Joseph Bugeja and Andreas Jacobsson and Paul
                 Davidsson",
  title =        "The Ethical Smart Home: Perspectives and Guidelines",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "1",
  pages =        "72--80",
  month =        jan # "\slash " # feb,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3111668",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jan 31 15:37:00 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2022:IOJa,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Open Journal of the Computer
                 Society}}}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "1",
  pages =        "81--81",
  month =        jan # "\slash " # feb,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3136973",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jan 31 15:37:00 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Alt:2022:BPC,
  author =       "Florian Alt and Stefan Schneegass",
  title =        "Beyond Passwords: Challenges and Opportunities of
                 Future Authentication",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "1",
  pages =        "82--86",
  month =        jan # "\slash " # feb,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3127459",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jan 31 15:37:00 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2022:IPCa,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Pervasive Computing}}} Call For
                 Articles",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "1",
  pages =        "86--86",
  month =        jan # "\slash " # feb,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3136974",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jan 31 15:37:00 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Nautiyal:2022:UKC,
  author =       "Lata Nautiyal and Awais Rashid and Joseph Hallett and
                 Ben Shreeve and Michael K. and Chris E. and Catherine
                 H.",
  title =        "The {United Kingdom}'s {Cyber Security Degree
                 Certification} Program: a Cyber Security Body of
                 Knowledge Case Study",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "1",
  pages =        "87--95",
  month =        jan # "\slash " # feb,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3127845",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jan 31 15:37:00 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2022:ICGa,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Computer Graphics and
                 Applications}}}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "1",
  pages =        "95--95",
  month =        jan # "\slash " # feb,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3136975",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jan 31 15:37:00 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Schmitt:2022:MDF,
  author =       "Veronica Schmitt",
  title =        "Medical Device Forensics",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "1",
  pages =        "96--100",
  month =        jan # "\slash " # feb,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3127490",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jan 31 15:37:00 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2022:IDI,
  author =       "Anonymous",
  title =        "{IEEE Diversity and Inclusion Fund}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "1",
  pages =        "101--101",
  month =        jan # "\slash " # feb,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3136976",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jan 31 15:37:00 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{vanOorschot:2022:VSS,
  author =       "Paul C. van Oorschot",
  title =        "A View of Security as 20 Subject Areas in Four
                 Themes",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "1",
  pages =        "102--108",
  month =        jan # "\slash " # feb,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3130744",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jan 31 15:37:00 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Shostack:2022:YAS,
  author =       "Adam Shostack",
  title =        "25 Years in Application Security: Looking Back,
                 Looking Forward",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "1",
  pages =        "109--112",
  month =        jan # "\slash " # feb,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3127961",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jan 31 15:37:00 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2022:ITB,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Transactions on Big Data}}}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "1",
  pages =        "112--112",
  month =        jan # "\slash " # feb,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3136977",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jan 31 15:37:00 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Kardash:2022:PCG,
  author =       "Adam Kardash and Suzanne Morin",
  title =        "The Practices and Challenges of Generating
                 Nonidentifiable Data",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "1",
  pages =        "113--118",
  month =        jan # "\slash " # feb,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3126185",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jan 31 15:37:00 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2022:ITC,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Transactions on Computers}}} Call
                 for Papers",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "1",
  pages =        "118--118",
  month =        jan # "\slash " # feb,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3136978",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jan 31 15:37:00 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Schneier:2022:RHG,
  author =       "Bruce Schneier",
  title =        "Robot Hacking Games",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "1",
  pages =        "119--120",
  month =        jan # "\slash " # feb,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3121885",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jan 31 15:37:00 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2022:ITSa,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Transactions on Sustainable
                 Computing}}}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "1",
  pages =        "119--119",
  month =        jan # "\slash " # feb,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3136979",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jan 31 15:37:00 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2022:ICSd,
  author =       "Anonymous",
  title =        "{IEEE Computer Society} Information",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "1",
  pages =        "C3--C3",
  month =        jan # "\slash " # feb,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3118956",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jan 31 15:37:00 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2022:IJ,
  author =       "Anonymous",
  title =        "{IEEE JobSite}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "1",
  pages =        "C4--C4",
  month =        jan # "\slash " # feb,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3136980",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jan 31 15:37:00 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2022:FCb,
  author =       "Anonymous",
  title =        "Front Cover",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "2",
  pages =        "C1--C1",
  month =        mar # "\slash " # apr,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3130866",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Apr 4 09:38:59 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2022:ICEb,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Computing Edge}}}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "2",
  pages =        "C2--C2",
  month =        mar # "\slash " # apr,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3152887",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Apr 4 09:38:59 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2022:TCb,
  author =       "Anonymous",
  title =        "Table of Contents",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "2",
  pages =        "1--2",
  month =        mar # "\slash " # apr,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3130864",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Apr 4 09:38:59 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2022:Mb,
  author =       "Anonymous",
  title =        "Masthead",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "2",
  pages =        "3--3",
  month =        mar # "\slash " # apr,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3130865",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Apr 4 09:38:59 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2022:PGT,
  author =       "Anonymous",
  title =        "Pseudo Ground-Truth Generators and Large-Scale
                 Studies",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "2",
  pages =        "4--7",
  month =        mar # "\slash " # apr,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3137674",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Apr 4 09:38:59 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2022:RSb,
  author =       "Anonymous",
  title =        "{Reliability Society}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "2",
  pages =        "5--5",
  month =        mar # "\slash " # apr,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3130867",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Apr 4 09:38:59 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Benzel:2022:SPI,
  author =       "Terry Benzel and Thorsten Holz",
  title =        "Selected Papers From the {2021 IEEE Symposium on
                 Security and Privacy}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "2",
  pages =        "8--9",
  month =        mar # "\slash " # apr,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3142463",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Apr 4 09:38:59 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Zhang:2022:PCL,
  author =       "Penghui Zhang and Adam Oest and Haehyun Cho and Zhibo
                 Sun and R. C. Johnson and Brad Wardman and Shaown
                 Sarker and Alexandros Kapravelos and Tiffany Bao and
                 Ruoyu Wang and Yan Shoshitaishvili and Adam Doup{\'e}
                 and Gail-Joon Ahn",
  title =        "\pkg{CrawlPhish}: Large-Scale Analysis of Client-Side
                 Cloaking Techniques in Phishing",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "2",
  pages =        "10--21",
  month =        mar # "\slash " # apr,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3129992",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Apr 4 09:38:59 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Ling:2022:FLZ,
  author =       "Chen Ling and Gianluca Stringhini and Utkucan Balc{\i}
                 and Jeremy Blackburn",
  title =        "A First Look at Zoombombing",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "2",
  pages =        "22--30",
  month =        mar # "\slash " # apr,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3127392",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Apr 4 09:38:59 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Emami-Naeini:2022:ISP,
  author =       "Pardis Emami-Naeini and Janarth Dheenadhayalan and
                 Yuvraj Agarwal and Lorrie Faith Cranor",
  title =        "An Informative Security and Privacy Nutrition Label
                 for {Internet of Things} Devices",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "2",
  pages =        "31--39",
  month =        mar # "\slash " # apr,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3132398",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Apr 4 09:38:59 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Daffalla:2022:DTU,
  author =       "Alaa Daffalla and Lucy Simko and Tadayoshi Kohno and
                 Alexandru G. Bardas",
  title =        "Defensive Technology Use During the 2018--2019
                 {Sudanese} Revolution",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "2",
  pages =        "40--48",
  month =        mar # "\slash " # apr,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3128819",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Apr 4 09:38:59 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2022:IAH,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Annals of the History of
                 Computing}}}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "2",
  pages =        "48--48",
  month =        mar # "\slash " # apr,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3152888",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Apr 4 09:38:59 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Huaman:2022:TWD,
  author =       "Nicolas Huaman and Sabrina Amft and Marten Oltrogge
                 and Yasemin Acar and Sascha Fahl",
  title =        "They Would Do Better If They Worked Together:
                 Interaction Problems Between Password Managers and the
                 {Web}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "2",
  pages =        "49--60",
  month =        mar # "\slash " # apr,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3123795",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Apr 4 09:38:59 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Mangaokar:2022:DMC,
  author =       "Neal Mangaokar and Atul Prakash",
  title =        "Dispelling Misconceptions and Characterizing the
                 Failings of Deepfake Detection",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "2",
  pages =        "61--67",
  month =        mar # "\slash " # apr,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3099782",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Apr 4 09:38:59 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Woods:2022:IRL,
  author =       "Daniel W. Woods and Rainer B{\"o}hme",
  title =        "Incident Response as a Lawyers Service",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "2",
  pages =        "68--74",
  month =        mar # "\slash " # apr,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3096742",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Apr 4 09:38:59 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2022:ICSe,
  author =       "Anonymous",
  title =        "{IEEE Computer Society} Call for Special issue
                 Proposals",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "2",
  pages =        "75--75",
  month =        mar # "\slash " # apr,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3152889",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Apr 4 09:38:59 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Fischer:2022:NSD,
  author =       "Felix Fischer and Jens Grossklags",
  title =        "Nudging Software Developers Toward Secure Code",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "2",
  pages =        "76--79",
  month =        mar # "\slash " # apr,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3142337",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Apr 4 09:38:59 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Boudot:2022:SAI,
  author =       "Fabrice Boudot and Pierrick Gaudry and Aurore
                 Guillevic and Nadia Heninger and Emmanuel Thom{\'e} and
                 Paul Zimmermann",
  title =        "The State of the Art in Integer Factoring and Breaking
                 Public-Key Cryptography",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "2",
  pages =        "80--86",
  month =        mar # "\slash " # apr,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3141918",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Apr 4 09:38:59 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2020.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2022:IOA,
  author =       "Anonymous",
  title =        "{IEEE Open Access} of the {Computer Society}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "2",
  pages =        "87--87",
  month =        mar # "\slash " # apr,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3152890",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Apr 4 09:38:59 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Heymann:2022:SSP,
  author =       "Elisa R. Heymann and Barton P. Miller",
  title =        "Software Security for the People: Free and Open
                 Resources for Software Security Training",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "2",
  pages =        "88--95",
  month =        mar # "\slash " # apr,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3142336",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Apr 4 09:38:59 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2022:ICGb,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Computer Graphics and
                 Applications}}}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "2",
  pages =        "95--95",
  month =        mar # "\slash " # apr,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3152891",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Apr 4 09:38:59 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Enck:2022:TFC,
  author =       "William Enck and Laurie Williams",
  title =        "Top Five Challenges in Software Supply Chain Security:
                 Observations From 30 Industry and Government
                 Organizations",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "2",
  pages =        "96--100",
  month =        mar # "\slash " # apr,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3142338",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Apr 4 09:38:59 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Massacci:2022:BPL,
  author =       "Fabio Massacci and Silvia Vidor",
  title =        "Building Principles for Lawful Cyber Lethal Autonomous
                 Weapons",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "2",
  pages =        "101--106",
  month =        mar # "\slash " # apr,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3143269",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Apr 4 09:38:59 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2022:ICSf,
  author =       "Anonymous",
  title =        "{IEEE Computer Society} Call for Papers",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "2",
  pages =        "107--107",
  month =        mar # "\slash " # apr,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3152892",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Apr 4 09:38:59 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Bellovin:2022:OST,
  author =       "Steven M. Bellovin",
  title =        "Open Source and Trust",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "2",
  pages =        "107--108",
  month =        mar # "\slash " # apr,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3142464",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Apr 4 09:38:59 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/gnu.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2022:ICSg,
  author =       "Anonymous",
  title =        "{IEEE Computer Society} Information",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "2",
  pages =        "C3--C3",
  month =        mar # "\slash " # apr,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3130868",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Apr 4 09:38:59 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2022:IJBa,
  author =       "Anonymous",
  title =        "{IEEE Jobs Board}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "2",
  pages =        "C4--C4",
  month =        mar # "\slash " # apr,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3152893",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Apr 4 09:38:59 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2022:FCc,
  author =       "Anonymous",
  title =        "Front Cover",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "3",
  pages =        "C1--C1",
  month =        may # "\slash " # jun,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3137673",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jun 7 10:14:13 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2022:CE,
  author =       "Anonymous",
  title =        "{{\booktitle{Computing Edge}}}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "3",
  pages =        "C2--C2",
  month =        may # "\slash " # jun,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3171932",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jun 7 10:14:13 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2022:TCc,
  author =       "Anonymous",
  title =        "Table of Contents",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "3",
  pages =        "1--2",
  month =        may # "\slash " # jun,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3160251",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jun 7 10:14:13 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2022:Mc,
  author =       "Anonymous",
  title =        "Masthead",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "3",
  pages =        "3--3",
  month =        may # "\slash " # jun,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3160245",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jun 7 10:14:13 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Zurko:2022:DRU,
  author =       "Mary Ellen Zurko",
  title =        "Disinformation and Reflections From Usable Security",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "3",
  pages =        "4--7",
  month =        may # "\slash " # jun,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3159405",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jun 7 10:14:13 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2022:RSc,
  author =       "Anonymous",
  title =        "Reliability Society",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "3",
  pages =        "5--5",
  month =        may # "\slash " # jun,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3133131",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jun 7 10:14:13 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Kohno:2022:END,
  author =       "Tadayoshi Kohno",
  title =        "Excerpts From the {{\booktitle{New Dictionary of
                 Cybersecurity, 2036}}}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "3",
  pages =        "8--8",
  month =        may # "\slash " # jun,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3159400",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jun 7 10:14:13 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2022:IIS,
  author =       "Anonymous",
  title =        "Introducing {{\booktitle{IEEE Security \& Privacy}}}'s
                 {``Off} by One'' Column",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "3",
  pages =        "9--9",
  month =        may # "\slash " # jun,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3159399",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jun 7 10:14:13 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Kohno:2022:MPB,
  author =       "Tadayoshi Kohno",
  title =        "{Mx. President} Has a Brain",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "3",
  pages =        "9--11",
  month =        may # "\slash " # jun,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3159425",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jun 7 10:14:13 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2022:UIS,
  author =       "Anonymous",
  title =        "Updates From {{\booktitle{IEEE Security \&
                 Privacy}}}'s {Editor-in-Chief Sean Peisert}: And Now
                 For Something Completely Different",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "3",
  pages =        "11--11",
  month =        may # "\slash " # jun,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3160889",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jun 7 10:14:13 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Blakley:2022:HAT,
  author =       "Bob Blakley and Lorrie Cranor",
  title =        "High Assurance in the {Twenty-First Century} With
                 {Roger Schell}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "3",
  pages =        "12--21",
  month =        may # "\slash " # jun,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3159044",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jun 7 10:14:13 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2022:IC,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE CGA}}}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "3",
  pages =        "21--21",
  month =        may # "\slash " # jun,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3171933",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jun 7 10:14:13 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Martin:2022:FMS,
  author =       "William Martin and Patrick Lincoln and William
                 Scherlis",
  title =        "Formal Methods at Scale",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "3",
  pages =        "22--23",
  month =        may # "\slash " # jun,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3158842",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jun 7 10:14:13 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2022:ICC,
  author =       "Anonymous",
  title =        "{IEEE CS CFP} filler",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "3",
  pages =        "23--23",
  month =        may # "\slash " # jun,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3171976",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jun 7 10:14:13 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Basin:2022:TVL,
  author =       "David Basin and Cas Cremers and Jannik Dreier and Ralf
                 Sasse",
  title =        "{Tamarin}: Verification of Large-Scale, Real-World,
                 Cryptographic Protocols",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "3",
  pages =        "24--32",
  month =        may # "\slash " # jun,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3154689",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jun 7 10:14:13 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2020.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2022:ICI,
  author =       "Anonymous",
  title =        "{IEEE CS IT Professional} filler",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "3",
  pages =        "32--32",
  month =        may # "\slash " # jun,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3171988",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jun 7 10:14:13 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Malecha:2022:DFM,
  author =       "Gregory Malecha and Gordon Stewart and Franti ek Farka
                 and Jasper Haag and Yoichi Hirai",
  title =        "Developing With Formal Methods at {BedRock Systems,
                 Inc.}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "3",
  pages =        "33--42",
  month =        may # "\slash " # jun,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3158196",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jun 7 10:14:13 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2022:ISR,
  author =       "Anonymous",
  title =        "{IEEE SP} Over the Rainbow filler2",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "3",
  pages =        "42--42",
  month =        may # "\slash " # jun,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3172005",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jun 7 10:14:13 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Deutschbein:2022:THS,
  author =       "Calvin Deutschbein and Andres Meza and Francesco
                 Restuccia and Matthew Gregoire and Ryan Kastner and
                 Cynthia Sturton",
  title =        "Toward Hardware Security Property Generation at
                 Scale",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "3",
  pages =        "43--51",
  month =        may # "\slash " # jun,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3155376",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jun 7 10:14:13 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Cofer:2022:CSE,
  author =       "Darren Cofer and Isaac Amundson and Junaid Babar and
                 David Hardin and Konrad Slind and Perry Alexander and
                 John Hatcliff and Robby and Gerwin Klein and Corey
                 Lewis and Eric Mercer and John Shackleton",
  title =        "Cyberassured Systems Engineering at Scale",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "3",
  pages =        "52--64",
  month =        may # "\slash " # jun,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3151733",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jun 7 10:14:13 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Dodds:2022:FVI,
  author =       "Mike Dodds",
  title =        "Formally Verifying Industry Cryptography",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "3",
  pages =        "65--70",
  month =        may # "\slash " # jun,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3153035",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jun 7 10:14:13 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2020.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2022:IPCb,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Pervasive Computing}}}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "3",
  pages =        "70--70",
  month =        may # "\slash " # jun,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3171997",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jun 7 10:14:13 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Raponi:2022:RTP,
  author =       "Simone Raponi and Savio Sciancalepore and Gabriele
                 Oligeri and Roberto {Di Pietro}",
  title =        "Road Traffic Poisoning of Navigation Apps: Threats and
                 Countermeasures",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "3",
  pages =        "71--79",
  month =        may # "\slash " # jun,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3110307",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jun 7 10:14:13 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Skopik:2022:OLD,
  author =       "Florian Skopik and Max Landauer and Markus
                 Wurzenberger",
  title =        "Online Log Data Analysis With Efficient Machine
                 Learning: A Review",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "3",
  pages =        "80--90",
  month =        may # "\slash " # jun,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3113275",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jun 7 10:14:13 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2022:ITF,
  author =       "Anonymous",
  title =        "{IEEE} tbd filler",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "3",
  pages =        "90--90",
  month =        may # "\slash " # jun,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3171998",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jun 7 10:14:13 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Tedeschi:2022:PPS,
  author =       "Pietro Tedeschi and Kang Eun Jeon and James She and
                 Simon Wong and Spiridon Bakiras and Roberto {Di
                 Pietro}",
  title =        "Privacy-Preserving and Sustainable Contact Tracing
                 Using Batteryless {Bluetooth} Low-Energy Beacons",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "3",
  pages =        "91--100",
  month =        may # "\slash " # jun,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3115497",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jun 7 10:14:13 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2022:ITG,
  author =       "Anonymous",
  title =        "{IEEE TC} Generic {CFP} filler",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "3",
  pages =        "100--100",
  month =        may # "\slash " # jun,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3171999",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jun 7 10:14:13 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2022:IOC,
  author =       "Anonymous",
  title =        "{IEEE OJ Computer Society} filler",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "3",
  pages =        "101--101",
  month =        may # "\slash " # jun,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3172010",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jun 7 10:14:13 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Dykstra:2022:ABT,
  author =       "Josiah Dykstra and Jamie Met and Nicole Backert and
                 Rebecca Mattie and Douglas Hough",
  title =        "Action Bias and the Two Most Dangerous Words in
                 Cybersecurity Incident Response: An Argument for More
                 Measured Incident Response",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "3",
  pages =        "102--106",
  month =        may # "\slash " # jun,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3159471",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jun 7 10:14:13 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2022:ITSb,
  author =       "Anonymous",
  title =        "{IEEE Trans Sustainable Comp} filler",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "3",
  pages =        "107--107",
  month =        may # "\slash " # jun,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3172000",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jun 7 10:14:13 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Bertino:2022:PPS,
  author =       "Elisa Bertino",
  title =        "The Persistent Problem of Software Insecurity",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "3",
  pages =        "107--108",
  month =        may # "\slash " # jun,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3158841",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jun 7 10:14:13 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2022:ICSh,
  author =       "Anonymous",
  title =        "{IEEE Computer Society} Information",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "3",
  pages =        "C3--C3",
  month =        may # "\slash " # jun,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3167619",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jun 7 10:14:13 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2022:ICJ,
  author =       "Anonymous",
  title =        "{IEEE CS Job Boards}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "3",
  pages =        "C4--C4",
  month =        may # "\slash " # jun,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3172001",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Jun 7 10:14:13 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2022:FCd,
  author =       "Anonymous",
  title =        "Front Cover",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "4",
  pages =        "C1--C1",
  month =        jul # "\slash " # aug,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3177109",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 13:15:14 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2022:ICEc,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Computing Edge}}}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "4",
  pages =        "C2--C2",
  month =        jul # "\slash " # aug,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3183366",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 13:15:14 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2022:TCd,
  author =       "Anonymous",
  title =        "Table of Contents",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "4",
  pages =        "1--2",
  month =        jul # "\slash " # aug,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3177110",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 13:15:14 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2022:Md,
  author =       "Anonymous",
  title =        "Masthead",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "4",
  pages =        "3--3",
  month =        jul # "\slash " # aug,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3177111",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 13:15:14 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Kohno:2022:BOC,
  author =       "Tadayoshi Kohno and Camille Cobb and Ada Lerner and
                 Michelle Lin and Adam Shostack",
  title =        "The Buffet Overflow Caf{\'e}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "4",
  pages =        "4--7",
  month =        jul # "\slash " # aug,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3173122",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 13:15:14 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2022:RSd,
  author =       "Anonymous",
  title =        "Reliability Society",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "4",
  pages =        "5--5",
  month =        jul # "\slash " # aug,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3177112",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 13:15:14 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Shim:2022:DLO,
  author =       "WooChul Shim and Hyejin Shin and Yong Ho Hwang",
  title =        "On Data Licenses for Open Source Threat Intelligence",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "4",
  pages =        "8--22",
  month =        jul # "\slash " # aug,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3127218",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 13:15:14 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2022:ICSi,
  author =       "Anonymous",
  title =        "{IEEE Computer Society} Election",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "4",
  pages =        "22--22",
  month =        jul # "\slash " # aug,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3183367",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 13:15:14 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Rusman:2022:MEC,
  author =       "Galina S. Rusman and Yulia A. Morozova",
  title =        "Measures to Ensure Cybersecurity of Industrial
                 Enterprises: a Legal Perspective",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "4",
  pages =        "23--28",
  month =        jul # "\slash " # aug,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3129543",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 13:15:14 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Shi:2022:TMT,
  author =       "Zhenpeng Shi and Kalman Graffi and David Starobinski
                 and Nikolay Matyunin",
  title =        "Threat Modeling Tools: a Taxonomy",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "4",
  pages =        "29--39",
  month =        jul # "\slash " # aug,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3125229",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 13:15:14 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Kristianto:2022:DPK,
  author =       "Edy Kristianto and Van-Linh Nguyen and Po-Ching Lin",
  title =        "Decentralized Public-Key Infrastructure With
                 Blockchain in {V2X} Communications: Promising or Only
                 Euphoria?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "4",
  pages =        "40--50",
  month =        jul # "\slash " # aug,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3141727",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 13:15:14 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2022:ICSj,
  author =       "Anonymous",
  title =        "{IEEE Computer Society} Call for Papers",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "4",
  pages =        "50--50",
  month =        jul # "\slash " # aug,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3183368",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 13:15:14 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Munir:2022:SIS,
  author =       "Arslan Munir and Erik Blasch and Alexander Aved and
                 Edward Paul Ratazzi and Joonho Kong",
  title =        "Security Issues in Situational Awareness: Adversarial
                 Threats and Mitigation Techniques",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "4",
  pages =        "51--60",
  month =        jul # "\slash " # aug,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3143548",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 13:15:14 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2022:ICSk,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Computing in Science and
                 Engineering}}}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "4",
  pages =        "60--60",
  month =        jul # "\slash " # aug,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3183369",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 13:15:14 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Huck:2022:WDF,
  author =       "Jan Huck and Frank Breitinger",
  title =        "Wake Up Digital Forensics Community and Help Combat
                 Ransomware",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "4",
  pages =        "61--70",
  month =        jul # "\slash " # aug,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3137018",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 13:15:14 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2022:ICSl,
  author =       "Anonymous",
  title =        "{2023 IEEE Computer Society Nomination for Watts S.
                 Humphrey Award}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "4",
  pages =        "70--70",
  month =        jul # "\slash " # aug,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3183370",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 13:15:14 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Geer:2022:I,
  author =       "Daniel E. Geer",
  title =        "Identity",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "4",
  pages =        "71--72",
  month =        jul # "\slash " # aug,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3173817",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 13:15:14 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2022:ISPa,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Security \& Privacy}}} Subscribe",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "4",
  pages =        "71--71",
  month =        jul # "\slash " # aug,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3183371",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 13:15:14 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2022:ICSm,
  author =       "Anonymous",
  title =        "{IEEE Computer Society} Information",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "4",
  pages =        "C3--C3",
  month =        jul # "\slash " # aug,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3183765",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 13:15:14 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2022:IJBb,
  author =       "Anonymous",
  title =        "{IEEE Job Boards}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "4",
  pages =        "C4--C4",
  month =        jul # "\slash " # aug,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3183372",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 13:15:14 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2022:FCe,
  author =       "Anonymous",
  title =        "Front Cover",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "5",
  pages =        "C1--C1",
  month =        sep # "\slash " # oct,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3187934",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 13:15:14 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2022:IQW,
  author =       "Anonymous",
  title =        "{IEEE Quantum Week 2022}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "5",
  pages =        "C2--C2",
  month =        sep # "\slash " # oct,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3199545",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 13:15:14 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2022:TCe,
  author =       "Anonymous",
  title =        "Table of Contents",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "5",
  pages =        "1--2",
  month =        sep # "\slash " # oct,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3187935",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 13:15:14 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2022:Me,
  author =       "Anonymous",
  title =        "Masthead",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "5",
  pages =        "3--3",
  month =        sep # "\slash " # oct,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3187936",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 13:15:14 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Michael:2022:TMA,
  author =       "James Bret Michael",
  title =        "Taking a Measured Approach to Investing in Information
                 Infrastructure for Attaining Leading-Edge Trustworthy
                 Artificial Intelligence",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "5",
  pages =        "4--6",
  month =        sep # "\slash " # oct,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3187308",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 13:15:14 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2022:RSe,
  author =       "Anonymous",
  title =        "Reliability Society",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "5",
  pages =        "5--5",
  month =        sep # "\slash " # oct,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3187937",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 13:15:14 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Williams:2022:TTH,
  author =       "Laurie Williams",
  title =        "Trusting Trust: Humans in the Software Supply Chain
                 Loop",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "5",
  pages =        "7--10",
  month =        sep # "\slash " # oct,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3173123",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 13:15:14 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2022:ICSn,
  author =       "Anonymous",
  title =        "{IEEE Computer Society} Call for Papers",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "5",
  pages =        "10--10",
  month =        sep # "\slash " # oct,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3199547",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 13:15:14 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Baracaldo:2022:MLS,
  author =       "Nathalie Baracaldo and Alina Oprea",
  title =        "Machine Learning Security and Privacy",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "5",
  pages =        "11--13",
  month =        sep # "\slash " # oct,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3188190",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 13:15:14 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Kohno:2022:S,
  author =       "Tadayoshi Kohno",
  title =        "The {Schuhmacher}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "5",
  pages =        "14--15",
  month =        sep # "\slash " # oct,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3187631",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 13:15:14 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2022:WLO,
  author =       "Anonymous",
  title =        "Welcome to the Latest Off by One Column",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "5",
  pages =        "15--15",
  month =        sep # "\slash " # oct,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3200193",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 13:15:14 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Massacci:2022:FFP,
  author =       "Fabio Massacci and Antonino Sabetta and Jelena
                 Mirkovic and Toby Murray and Hamed Okhravi and Mohammad
                 Mannan and Anderson Rocha and Eric Bodden and Daniel E.
                 Geer",
  title =        "Free as in Freedom to Protest?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "5",
  pages =        "16--21",
  month =        sep # "\slash " # oct,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3185845",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 13:15:14 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Cho:2022:SDN,
  author =       "Minsu Cho and Zahra Ghodsi and Brandon Reagen and
                 Siddharth Garg and Chinmay Hegde",
  title =        "{Sphynx}: a Deep Neural Network Design for Private
                 Inference",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "5",
  pages =        "22--34",
  month =        sep # "\slash " # oct,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3165475",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 13:15:14 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2022:ISPb,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Security and Privacy}}} Subscribe",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "5",
  pages =        "34--34",
  month =        sep # "\slash " # oct,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3199548",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 13:15:14 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Aharoni:2022:CET,
  author =       "Ehud Aharoni and Nir Drucker and Gilad Ezov and Hayim
                 Shaul and Omri Soceanu",
  title =        "Complex Encoded Tile Tensors: Accelerating Encrypted
                 Analytics",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "5",
  pages =        "35--43",
  month =        sep # "\slash " # oct,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3181689",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 13:15:14 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Strobel:2022:DPT,
  author =       "Martin Strobel and Reza Shokri",
  title =        "Data Privacy and Trustworthy Machine Learning",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "5",
  pages =        "44--49",
  month =        sep # "\slash " # oct,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3178187",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 13:15:14 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Li:2022:BAN,
  author =       "Shaofeng Li and Tian Dong and Benjamin Zi Hao Zhao and
                 Minhui Xue and Suguo Du and Haojin Zhu",
  title =        "Backdoors Against Natural Language Processing: A
                 Review",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "5",
  pages =        "50--59",
  month =        sep # "\slash " # oct,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3181001",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 13:15:14 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Marjanov:2022:MLS,
  author =       "Tina Marjanov and Ivan Pashchenko and Fabio Massacci",
  title =        "Machine Learning for Source Code Vulnerability
                 Detection: What Works and What Isn't There Yet",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "5",
  pages =        "60--76",
  month =        sep # "\slash " # oct,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3176058",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 13:15:14 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2022:IPCc,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Pervasive Computing}}} Call for
                 Articles",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "5",
  pages =        "76--76",
  month =        sep # "\slash " # oct,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3199549",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 13:15:14 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Demetrio:2022:PAM,
  author =       "Luca Demetrio and Battista Biggio and Fabio Roli",
  title =        "Practical Attacks on Machine Learning: a Case Study on
                 Adversarial {Windows} Malware",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "5",
  pages =        "77--85",
  month =        sep # "\slash " # oct,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3182356",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 13:15:14 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Divakaran:2022:PDL,
  author =       "Dinil Mon Divakaran and Adam Oest",
  title =        "Phishing Detection Leveraging Machine Learning and
                 Deep Learning: a Review",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "5",
  pages =        "86--95",
  month =        sep # "\slash " # oct,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3175225",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 13:15:14 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Hermann:2022:WAE,
  author =       "Ben Hermann",
  title =        "What Has Artifact Evaluation Ever Done for Us?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "5",
  pages =        "96--99",
  month =        sep # "\slash " # oct,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3184234",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 13:15:14 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2022:IOJb,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Open Journal of the Computing
                 Society}}}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "5",
  pages =        "100--100",
  month =        sep # "\slash " # oct,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3199550",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 13:15:14 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Caviglione:2022:NMM,
  author =       "Luca Caviglione and Wojciech Mazurczyk",
  title =        "Never Mind the Malware, Here's the Stegomalware",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "5",
  pages =        "101--106",
  month =        sep # "\slash " # oct,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3178205",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 13:15:14 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2022:ISPc,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Security and Privacy}}} {Over the
                 Rainbow} podcast",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "5",
  pages =        "107--107",
  month =        sep # "\slash " # oct,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3199551",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 13:15:14 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Schneier:2022:NPQ,
  author =       "Bruce Schneier",
  title =        "{NIST}'s Post-Quantum Cryptography Standards
                 Competition",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "5",
  pages =        "107--108",
  month =        sep # "\slash " # oct,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3184235",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 13:15:14 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2022:ICSo,
  author =       "Anonymous",
  title =        "{IEEE Computer Society} Information",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "5",
  pages =        "C3--C3",
  month =        sep # "\slash " # oct,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3187938",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 13:15:14 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2022:IJBc,
  author =       "Anonymous",
  title =        "{IEEE Jobs Board}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "5",
  pages =        "C4--C4",
  month =        sep # "\slash " # oct,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3199552",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 13:15:14 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2022:FCf,
  author =       "Anonymous",
  title =        "Front Cover",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "6",
  pages =        "C1--C1",
  month =        nov # "\slash " # dec,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3178619",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 13:15:14 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2022:ICSp,
  author =       "Anonymous",
  title =        "{IEEE Computer Society} Diversity and Inclusion",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "6",
  pages =        "C2--C2",
  month =        nov # "\slash " # dec,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3211751",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 13:15:14 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2022:TCf,
  author =       "Anonymous",
  title =        "Table of Contents",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "6",
  pages =        "1--2",
  month =        nov # "\slash " # dec,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3178620",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 13:15:14 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2022:Mf,
  author =       "Anonymous",
  title =        "Masthead",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "6",
  pages =        "3--3",
  month =        nov # "\slash " # dec,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3204472",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 13:15:14 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Kohno:2022:ORP,
  author =       "Tadayoshi Kohno",
  title =        "The Our Reality Privacy Policy",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "6",
  pages =        "4--7",
  month =        nov # "\slash " # dec,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3201712",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 13:15:14 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Kohno:2022:WLO,
  author =       "Tadayoshi Kohno",
  title =        "Welcome to the Latest Off by One Column",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "6",
  pages =        "5--5",
  month =        nov # "\slash " # dec,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3201713",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 13:15:14 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2022:RSf,
  author =       "Anonymous",
  title =        "Reliability Society",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "6",
  pages =        "7--7",
  month =        nov # "\slash " # dec,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3204473",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 13:15:14 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Weir:2022:ESS,
  author =       "Charles Weir and Sammy Migues and Laurie Williams",
  title =        "Exploring the Shift in Security Responsibility",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "6",
  pages =        "8--17",
  month =        nov # "\slash " # dec,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3150238",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 13:15:14 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Skopik:2022:BSS,
  author =       "Florian Skopik and Max Landauer and Markus
                 Wurzenberger",
  title =        "Blind Spots of Security Monitoring in Enterprise
                 Infrastructures: a Survey",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "6",
  pages =        "18--26",
  month =        nov # "\slash " # dec,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2021.3133764",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 13:15:14 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2022:ICSq,
  author =       "Anonymous",
  title =        "{IEEE Computer Society} Call For Papers",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "6",
  pages =        "26--26",
  month =        nov # "\slash " # dec,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3211752",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 13:15:14 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Gouert:2022:DMU,
  author =       "Charles Gouert and Nektarios Georgios Tsoutsos",
  title =        "Dirty Metadata: Understanding a Threat to Online
                 Privacy",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "6",
  pages =        "27--34",
  month =        nov # "\slash " # dec,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3148091",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 13:15:14 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Abou-Tair:2022:DSS,
  author =       "Dhiah el Diehn I. Abou-Tair and Ala Khalifeh",
  title =        "Distributed Self-Sovereign-Based Access Control
                 System",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "6",
  pages =        "35--42",
  month =        nov # "\slash " # dec,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3148906",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 13:15:14 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2022:ISPd,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Security and Privacy}}} Magazine
                 Subscribe",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "6",
  pages =        "42--42",
  month =        nov # "\slash " # dec,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3211753",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 13:15:14 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Yao:2022:BDF,
  author =       "Danfeng Daphne Yao and Sazzadur Rahaman and Ya Xiao
                 and Sharmin Afrose and Miles Frantz and Ke Tian and Na
                 Meng and Cristina Cifuentes and Yang Zhao and Nicholas
                 Allen and Nathan Keynes and Barton P. Miller and Elisa
                 Heymann and Murat Kantarcioglu and Fahad Shaon",
  title =        "Being the Developers Friend: Our Experience Developing
                 a High-Precision Tool for Secure Coding",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "6",
  pages =        "43--52",
  month =        nov # "\slash " # dec,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3159481",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 13:15:14 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2020.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  abstract =     "We discuss the needs and challenges of deployable
                 security research by sharing our experience designing
                 CryptoGuard, a high-precision tool for detecting
                 cryptographic application programming interface
                 misuses. Our project has produced multiple benchmarks
                 as well as measurement results on state-of-the-art
                 solutions.",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2022:IPCd,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Pervasive Computing}}} Call for
                 Papers",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "6",
  pages =        "52--52",
  month =        nov # "\slash " # dec,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3211754",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 13:15:14 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Grimes:2022:PBS,
  author =       "Howard D. Grimes and Gabriela F. Ciocarlie and Bo Yu
                 and Duminda Wijesekera and Greg Shannon and Wayne
                 Austad and Charles Fracchia and Dongyan Xu and Thomas
                 R. Kurfess and Lisa Strama and Michael Mylrea and Bill
                 Reid",
  title =        "{PURE} Biomanufacturing: Secure, Pandemic-Adaptive
                 Biomanufacturing",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "6",
  pages =        "53--65",
  month =        nov # "\slash " # dec,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3160465",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 13:15:14 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Moody:2022:CSP,
  author =       "Dustin Moody and Angela Robinson",
  title =        "Cryptographic Standards in the Post-Quantum Era",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "6",
  pages =        "66--72",
  month =        nov # "\slash " # dec,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3202589",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 13:15:14 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2020.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2022:IIPb,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE IT Professional}}} Call for
                 Articles",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "6",
  pages =        "72--72",
  month =        nov # "\slash " # dec,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3211755",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 13:15:14 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2022:IOJc,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Open Journal of the Computer
                 Society}}}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "6",
  pages =        "73--73",
  month =        nov # "\slash " # dec,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3211756",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 13:15:14 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{vanOorschot:2022:SAS,
  author =       "Paul C. van Oorschot",
  title =        "Security as an Artificial Science, System
                 Administration, and Tools",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "6",
  pages =        "74--78",
  month =        nov # "\slash " # dec,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3197066",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 13:15:14 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Hebert:2022:TMI,
  author =       "C{\'e}dric Hebert",
  title =        "Trust Me, {I}'m a Liar",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "6",
  pages =        "79--82",
  month =        nov # "\slash " # dec,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3202625",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 13:15:14 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2022:ICSr,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Computing in Science and
                 Engineering}}}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "6",
  pages =        "82--82",
  month =        nov # "\slash " # dec,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3211757",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 13:15:14 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2022:RP,
  author =       "Anonymous",
  title =        "{Over the Rainbow} Podcast",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "6",
  pages =        "83--83",
  month =        nov # "\slash " # dec,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3211758",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 13:15:14 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Bellovin:2022:WDW,
  author =       "Steven M. Bellovin",
  title =        "What Do We Owe?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "6",
  pages =        "83--84",
  month =        nov # "\slash " # dec,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3205512",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 13:15:14 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2022:ICSs,
  author =       "Anonymous",
  title =        "{IEEE Computer Society} Information",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "6",
  pages =        "C3--C3",
  month =        nov # "\slash " # dec,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3179122",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 13:15:14 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2022:IJBd,
  author =       "Anonymous",
  title =        "{IEEE Jobs Board}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "20",
  number =       "6",
  pages =        "C4--C4",
  month =        nov # "\slash " # dec,
  year =         "2022",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3211759",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Nov 17 13:15:14 2022",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2023:FCa,
  author =       "Anonymous",
  title =        "Front Cover",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "1",
  pages =        "C1--C1",
  month =        jan # "\slash " # feb,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3223594",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Apr 25 09:18:45 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2023:ICSa,
  author =       "Anonymous",
  title =        "{IEEE Computer Society} Benefits",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "1",
  pages =        "C2--C2",
  month =        jan # "\slash " # feb,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3231661",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Apr 25 09:18:45 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2023:TCa,
  author =       "Anonymous",
  title =        "Table of Contents",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "1",
  pages =        "1--2",
  month =        jan # "\slash " # feb,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3223596",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Apr 25 09:18:45 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2023:Ma,
  author =       "Anonymous",
  title =        "Masthead",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "1",
  pages =        "3--3",
  month =        jan # "\slash " # feb,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3223597",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Apr 25 09:18:45 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Benzel:2023:SPR,
  author =       "Terry Benzel",
  title =        "Security and Privacy Research Artifacts: Are We Making
                 Progress?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "1",
  pages =        "4--6",
  month =        jan # "\slash " # feb,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3222887",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Apr 25 09:18:45 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2023:RSa,
  author =       "Anonymous",
  title =        "Reliability Society",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "1",
  pages =        "5--5",
  month =        jan # "\slash " # feb,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3223601",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Apr 25 09:18:45 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2023:ICSb,
  author =       "Anonymous",
  title =        "{IEEE Computer Society} Publications Seek 2024
                 {Editors in Chief}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "1",
  pages =        "7--7",
  month =        jan # "\slash " # feb,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3232263",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Apr 25 09:18:45 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Zurko:2023:USP,
  author =       "Mary Ellen Zurko and Julie Haney",
  title =        "Usable Security and Privacy for Security and Privacy
                 Workers",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "1",
  pages =        "8--10",
  month =        jan # "\slash " # feb,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3221855",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Apr 25 09:18:45 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Blakley:2023:KMV,
  author =       "Bob Blakley and Lorrie Cranor",
  title =        "{Katie Moussouris}: Vulnerability Disclosure and
                 Security Workforce Development",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "1",
  pages =        "11--18",
  month =        jan # "\slash " # feb,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3222043",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Apr 25 09:18:45 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2023:IJBa,
  author =       "Anonymous",
  title =        "{IEEE Job Boards}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "1",
  pages =        "19--19",
  month =        jan # "\slash " # feb,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3231678",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Apr 25 09:18:45 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Gorski:2023:ELU,
  author =       "Peter Leo Gorski and Luigi {Lo Iacono} and Matthew
                 Smith",
  title =        "Eight Lightweight Usable Security Principles for
                 Developers",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "1",
  pages =        "20--26",
  month =        jan # "\slash " # feb,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3205484",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Apr 25 09:18:45 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Weir:2023:DYS,
  author =       "Charles Weir and Anna Dyson and Dan Prince",
  title =        "Do You Speak Cyber? {Talking} Security With Developers
                 of Health Systems and Devices",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "1",
  pages =        "27--36",
  month =        jan # "\slash " # feb,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3221616",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Apr 25 09:18:45 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2023:ICSc,
  author =       "Anonymous",
  title =        "{IEEE Computer Society} Call for Papers",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "1",
  pages =        "36--36",
  month =        jan # "\slash " # feb,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3231662",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Apr 25 09:18:45 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Fazelnia:2023:SAI,
  author =       "Mohamad Fazelnia and Ahmet Okutan and Mehdi
                 Mirakhorli",
  title =        "Supporting Artificial Intelligence\slash Machine
                 Learning Security Workers Through an Adversarial
                 Techniques, Tools, and Common Knowledge Framework",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "1",
  pages =        "37--48",
  month =        jan # "\slash " # feb,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3221058",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Apr 25 09:18:45 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Tahaei:2023:EPD,
  author =       "Mohammad Tahaei and Kami Vaniea and Awais Rashid",
  title =        "Embedding Privacy Into Design Through Software
                 Developers: Challenges and Solutions",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "1",
  pages =        "49--57",
  month =        jan # "\slash " # feb,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3204364",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Apr 25 09:18:45 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Malkin:2023:CIE,
  author =       "Nathan Malkin",
  title =        "Contextual Integrity, Explained: a More Usable Privacy
                 Definition",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "1",
  pages =        "58--65",
  month =        jan # "\slash " # feb,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3201585",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Apr 25 09:18:45 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Ciclosi:2023:DPO,
  author =       "Francesco Ciclosi and Fabio Massacci",
  title =        "The {Data Protection Officer}: a Ubiquitous Role That
                 No One Really Knows",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "1",
  pages =        "66--77",
  month =        jan # "\slash " # feb,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3222115",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Apr 25 09:18:45 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Shostack:2023:NGE,
  author =       "Adam Shostack",
  title =        "Nothing Is Good Enough: Fast and Cheap Are Undervalued
                 as Influencers of Security Tool Adoption",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "1",
  pages =        "78--83",
  month =        jan # "\slash " # feb,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3223551",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Apr 25 09:18:45 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Park:2023:FDI,
  author =       "Sungmi Park and Douglas Stebila",
  title =        "The Future of Digital Investigation: Automated Legal
                 Inference",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "1",
  pages =        "84--90",
  month =        jan # "\slash " # feb,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3223187",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Apr 25 09:18:45 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2023:ISPa,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Security and Privacy}}} Subscribe",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "1",
  pages =        "90--90",
  month =        jan # "\slash " # feb,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3231663",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Apr 25 09:18:45 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Bertino:2023:PEI,
  author =       "Elisa Bertino",
  title =        "Privacy in the Era of {5G}, {IoT}, {Big Data}, and
                 Machine Learning",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "1",
  pages =        "91--92",
  month =        jan # "\slash " # feb,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3221171",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Apr 25 09:18:45 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2023:ICSd,
  author =       "Anonymous",
  title =        "{IEEE Computer Society} Information",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "1",
  pages =        "C3--C3",
  month =        jan # "\slash " # feb,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3223619",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Apr 25 09:18:45 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2023:ICEa,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Computing Edge}}}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "1",
  pages =        "C4--C4",
  month =        jan # "\slash " # feb,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3231739",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Apr 25 09:18:45 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2023:FCb,
  author =       "Anonymous",
  title =        "Front Cover",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "2",
  pages =        "C1--C1",
  month =        mar # "\slash " # apr,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3240044",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Apr 25 09:18:45 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2023:ICSe,
  author =       "Anonymous",
  title =        "{IEEE Computer Society} Member Benefits",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "2",
  pages =        "C2--C2",
  month =        mar # "\slash " # apr,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3248920",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Apr 25 09:18:45 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2023:TCb,
  author =       "Anonymous",
  title =        "Table of Contents",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "2",
  pages =        "1--2",
  month =        mar # "\slash " # apr,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3240048",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Apr 25 09:18:45 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2023:Mb,
  author =       "Anonymous",
  title =        "Masthead",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "2",
  pages =        "3--3",
  month =        mar # "\slash " # apr,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3240050",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Apr 25 09:18:45 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Peisert:2023:FYI,
  author =       "Sean Peisert",
  title =        "The First 20 Years of {{\booktitle{IEEE Security \&
                 Privacy}}}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "2",
  pages =        "4--6",
  month =        mar # "\slash " # apr,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3236420",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Apr 25 09:18:45 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2023:RSb,
  author =       "Anonymous",
  title =        "Reliability Society",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "2",
  pages =        "5--5",
  month =        mar # "\slash " # apr,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3240052",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Apr 25 09:18:45 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Kohno:2023:EUR,
  author =       "Tadayoshi Kohno",
  title =        "In {Earth} Until (Ready)",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "2",
  pages =        "7--8",
  month =        mar # "\slash " # apr,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3237099",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Apr 25 09:18:45 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Blakley:2023:AEC,
  author =       "Bob Blakley and Lorrie Cranor",
  title =        "A 20th Anniversary Episode Chat With {S&P} Editors
                 {George Cybenko}, {Carl Landwehr}, {Shari Lawrence
                 Pfleeger}, and {Sean Peisert}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "2",
  pages =        "9--16",
  month =        mar # "\slash " # apr,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3239179",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Apr 25 09:18:45 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2023:ICI,
  author =       "Anonymous",
  title =        "{IEEE CAI 2023: IEEE Conference on Artificial
                 Intelligence}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "2",
  pages =        "17--17",
  month =        mar # "\slash " # apr,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3248971",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Apr 25 09:18:45 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Cowan:2023:OCS,
  author =       "Crispin Cowan",
  title =        "Open and Closed Software Security Redux",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "2",
  pages =        "18--23",
  month =        mar # "\slash " # apr,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3227819",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Apr 25 09:18:45 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Lipner:2023:IWS,
  author =       "Steve Lipner and Michael Howard",
  title =        "Inside the {Windows} Security Push: a Twenty-Year
                 Retrospective",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "2",
  pages =        "24--31",
  month =        mar # "\slash " # apr,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3228098",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Apr 25 09:18:45 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Landwehr:2023:LBF,
  author =       "Carl Landwehr and Michael K. Reiter and Laurie
                 Williams and Gene Tsudik and Trent Jaeger and Tadayoshi
                 Kohno and Apu Kapadia",
  title =        "Looking Backwards (and Forwards): {NSF} Secure and
                 Trustworthy Computing 20-Year Retrospective Panel
                 Transcription",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "2",
  pages =        "32--42",
  month =        mar # "\slash " # apr,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3208721",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Apr 25 09:18:45 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2023:RPa,
  author =       "Anonymous",
  title =        "Over the Rainbow Podcast",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "2",
  pages =        "42--42",
  month =        mar # "\slash " # apr,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3248972",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Apr 25 09:18:45 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Benzel:2023:ISP,
  author =       "Terry Benzel and Hilarie Orman",
  title =        "{{\booktitle{IEEE Security and Privacy}}} Symposium in
                 the Year 2003",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "2",
  pages =        "43--47",
  month =        mar # "\slash " # apr,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3237103",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Apr 25 09:18:45 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2023:ICSf,
  author =       "Anonymous",
  title =        "{2024 IEEE Computer Society Watts S. Humphery Software
                 Quality Award} Call For Nominations",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "2",
  pages =        "47--47",
  month =        mar # "\slash " # apr,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3248973",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Apr 25 09:18:45 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Redmiles:2023:PCS,
  author =       "Elissa M. Redmiles and Mia M. Bennett and Tadayoshi
                 Kohno",
  title =        "Power in Computer Security and Privacy: a Critical
                 Lens",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "2",
  pages =        "48--52",
  month =        mar # "\slash " # apr,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3238591",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Apr 25 09:18:45 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Cavallaro:2023:MLM,
  author =       "Lorenzo Cavallaro and Johannes Kinder and Feargus
                 Pendlebury and Fabio Pierazzi",
  title =        "Are Machine Learning Models for Malware Detection
                 Ready for Prime Time?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "2",
  pages =        "53--56",
  month =        mar # "\slash " # apr,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3236543",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Apr 25 09:18:45 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Wood:2023:HTS,
  author =       "Christopher A. Wood",
  title =        "Hot Topics in Security and Privacy Standardization at
                 the {IETF} and Beyond",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "2",
  pages =        "57--62",
  month =        mar # "\slash " # apr,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3237071",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Apr 25 09:18:45 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{True:2023:PIA,
  author =       "John True and Navid Asadizanjani",
  title =        "Physical Inspection and Attacks on Electronics: an
                 Academic Course for the Hardware Cybersecurity
                 Workforce",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "2",
  pages =        "63--69",
  month =        mar # "\slash " # apr,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3236999",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Apr 25 09:18:45 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{vanOorschot:2023:MEMa,
  author =       "Paul C. van Oorschot",
  title =        "Memory Errors and Memory Safety: {C} as a Case Study",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "2",
  pages =        "70--76",
  month =        mar # "\slash " # apr,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3236542",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Apr 25 09:18:45 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Narayanan:2023:SPA,
  author =       "Arvind Narayanan and Kevin Lee",
  title =        "Security Policy Audits: Why and How",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "2",
  pages =        "77--81",
  month =        mar # "\slash " # apr,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3236540",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Apr 25 09:18:45 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Zahan:2023:SBM,
  author =       "Nusrat Zahan and Elizabeth Lin and Mahzabin Tamanna
                 and William Enck and Laurie Williams",
  title =        "Software Bills of Materials Are Required. Are We There
                 Yet?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "2",
  pages =        "82--88",
  month =        mar # "\slash " # apr,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3237100",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Apr 25 09:18:45 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2023:IJBb,
  author =       "Anonymous",
  title =        "{IEEE Job Boards}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "2",
  pages =        "83--83",
  month =        mar # "\slash " # apr,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3248974",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Apr 25 09:18:45 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Geer:2023:WS,
  author =       "Daniel E. Geer",
  title =        "Whither Software?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "2",
  pages =        "89--90",
  month =        mar # "\slash " # apr,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3236541",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Apr 25 09:18:45 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2023:ISMa,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Software}}} Magazine Call for
                 Articles",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "2",
  pages =        "89--89",
  month =        mar # "\slash " # apr,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3249939",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Apr 25 09:18:45 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2023:ICSg,
  author =       "Anonymous",
  title =        "{IEEE Computer Society}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "2",
  pages =        "C3--C3",
  month =        mar # "\slash " # apr,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3240054",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Apr 25 09:18:45 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2023:ICEb,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Computing Edge}}}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "2",
  pages =        "C4--C4",
  month =        mar # "\slash " # apr,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3248975",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Tue Apr 25 09:18:45 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=8013",
}

@Article{Anonymous:2023:FCc,
  author =       "Anonymous",
  title =        "Front Cover",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "3",
  pages =        "C1--C1",
  month =        may # "\slash " # jun,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3264157",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jun 5 11:33:11 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Anonymous:2023:ICSh,
  author =       "Anonymous",
  title =        "{IEEE Computer Society} Member Benefits",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "3",
  pages =        "C2--C2",
  month =        may # "\slash " # jun,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3271179",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jun 5 11:33:11 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Anonymous:2023:TCc,
  author =       "Anonymous",
  title =        "Table of Contents",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "3",
  pages =        "1--2",
  month =        may # "\slash " # jun,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3264181",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jun 5 11:33:11 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Anonymous:2023:Mc,
  author =       "Anonymous",
  title =        "Masthead",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "3",
  pages =        "3--3",
  month =        may # "\slash " # jun,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3264183",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jun 5 11:33:11 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Jaeger:2023:BS,
  author =       "Trent Jaeger",
  title =        "On Bridges and Software",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "3",
  pages =        "4--5",
  month =        may # "\slash " # jun,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3258207",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jun 5 11:33:11 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Anonymous:2023:RSc,
  author =       "Anonymous",
  title =        "Reliability Society",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "3",
  pages =        "5--5",
  month =        may # "\slash " # jun,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3264185",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jun 5 11:33:11 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Jaeger:2023:IEH,
  author =       "Trent Jaeger and Brent ByungHoon Kang and Nele Mentens
                 and Cynthia Sturton",
  title =        "Impact of Emerging Hardware on Security and Privacy",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "3",
  pages =        "6--7",
  month =        may # "\slash " # jun,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3258206",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jun 5 11:33:11 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Park:2023:MPK,
  author =       "Soyeon Park and Sangho Lee and Taesoo Kim",
  title =        "Memory Protection Keys: Facts, Key Extension
                 Perspectives, and Discussions",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "3",
  pages =        "8--15",
  month =        may # "\slash " # jun,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3250601",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jun 5 11:33:11 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Anonymous:2023:RPb,
  author =       "Anonymous",
  title =        "Over the Rainbow Podcast",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "3",
  pages =        "15--15",
  month =        may # "\slash " # jun,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3271180",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jun 5 11:33:11 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Narayanan:2023:OLE,
  author =       "Vikram Narayanan and Anton Burtsev",
  title =        "The Opportunities and Limitations of Extended Page
                 Table Switching for Fine-Grained Isolation",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "3",
  pages =        "16--26",
  month =        may # "\slash " # jun,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3251385",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jun 5 11:33:11 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Anonymous:2023:WHS,
  author =       "Anonymous",
  title =        "{Watts S. Humphrey Software Quality Award}
                 Nominations",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "3",
  pages =        "26--26",
  month =        may # "\slash " # jun,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3271181",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jun 5 11:33:11 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Meza:2023:SVO,
  author =       "Andres Meza and Francesco Restuccia and Jason Oberg
                 and Dominic Rizzo and Ryan Kastner",
  title =        "Security Verification of the {OpenTitan} Hardware Root
                 of Trust",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "3",
  pages =        "27--36",
  month =        may # "\slash " # jun,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3251954",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jun 5 11:33:11 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Anonymous:2023:IQW,
  author =       "Anonymous",
  title =        "{IEEE} Quantum Week",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "3",
  pages =        "36--36",
  month =        may # "\slash " # jun,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3271182",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jun 5 11:33:11 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Lacoste:2023:TEE,
  author =       "Marc Lacoste and Vincent Lefebvre",
  title =        "Trusted Execution Environments for Telecoms:
                 Strengths, Weaknesses, Opportunities, and Threats",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "3",
  pages =        "37--46",
  month =        may # "\slash " # jun,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3259801",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jun 5 11:33:11 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Turner:2023:RBT,
  author =       "Adam Brian Turner and Stephen McCombie and Allon J.
                 Uhlmann",
  title =        "Ransomware-Bitcoin Threat Intelligence Sharing Using
                 Structured Threat Information Expression",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "3",
  pages =        "47--57",
  month =        may # "\slash " # jun,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3166282",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jun 5 11:33:11 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Gradon:2023:ESP,
  author =       "Kacper T. Gradon",
  title =        "Electric Sheep on the Pastures of Disinformation and
                 Targeted Phishing Campaigns: The Security Implications
                 of {ChatGPT}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "3",
  pages =        "58--61",
  month =        may # "\slash " # jun,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3255039",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jun 5 11:33:11 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{vanOorschot:2023:MEMb,
  author =       "Paul C. van Oorschot",
  title =        "Memory Errors and Memory Safety: a Look at {Java} and
                 {Rust}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "3",
  pages =        "62--68",
  month =        may # "\slash " # jun,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3249719",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jun 5 11:33:11 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib;
                 https://www.math.utah.edu/pub/tex/bib/java2020.bib;
                 https://www.math.utah.edu/pub/tex/bib/rust.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Anonymous:2023:ICSi,
  author =       "Anonymous",
  title =        "{IEEE Computer Society}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "3",
  pages =        "C3--C3",
  month =        may # "\slash " # jun,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3268935",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jun 5 11:33:11 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Anonymous:2023:ICSj,
  author =       "Anonymous",
  title =        "{IEEE Computer Society} {{\booktitle{Computing
                 Edge}}}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "3",
  pages =        "C4--C4",
  month =        may # "\slash " # jun,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3271183",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Mon Jun 5 11:33:11 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Anonymous:2023:FCd,
  author =       "Anonymous",
  title =        "Front Cover",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "4",
  pages =        "C1--C1",
  month =        jul # "\slash " # aug,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3282519",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 14 06:30:26 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Anonymous:2023:QW,
  author =       "Anonymous",
  title =        "Quantum Week 2023",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "4",
  pages =        "C2--C2",
  month =        jul # "\slash " # aug,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3288401",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 14 06:30:26 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Anonymous:2023:TCd,
  author =       "Anonymous",
  title =        "Table of Contents",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "4",
  pages =        "1--2",
  month =        jul # "\slash " # aug,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3282521",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 14 06:30:26 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Anonymous:2023:Md,
  author =       "Anonymous",
  title =        "Masthead",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "4",
  pages =        "3--3",
  month =        jul # "\slash " # aug,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3282523",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 14 06:30:26 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Peisert:2023:SID,
  author =       "Sean Peisert",
  title =        "On Software Infrastructure: Develop, Prove, Profit?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "4",
  pages =        "4--8",
  month =        jul # "\slash " # aug,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3273492",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 14 06:30:26 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Anonymous:2023:RSd,
  author =       "Anonymous",
  title =        "Reliability Society",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "4",
  pages =        "5--5",
  month =        jul # "\slash " # aug,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3282525",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 14 06:30:26 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Anonymous:2023:ISMb,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Software}}} Magazine Call for
                 Articles",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "4",
  pages =        "8--8",
  month =        jul # "\slash " # aug,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3288419",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 14 06:30:26 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Ciocarlie:2023:SCI,
  author =       "Gabriela F. Ciocarlie and Jianying Zhou",
  title =        "Securing Critical Infrastructure Across Cyber and
                 Physical Dimensions",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "4",
  pages =        "9--9",
  month =        jul # "\slash " # aug,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3282424",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 14 06:30:26 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Ayub:2023:HIC,
  author =       "Adeen Ayub and Wooyeon Jo and Syed Ali Qasim and Irfan
                 Ahmed",
  title =        "How Are Industrial Control Systems Insecure by Design?
                 {A} Deeper Insight Into Real-World Programmable Logic
                 Controllers",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "4",
  pages =        "10--19",
  month =        jul # "\slash " # aug,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3271273",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 14 06:30:26 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Burbano:2023:OAR,
  author =       "Luis Burbano and Kunal Garg and Santiago J. Leudo and
                 Alvaro A. Cardenas and Ricardo G. Sanfelice",
  title =        "Online Attack Recovery in Cyberphysical Systems",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "4",
  pages =        "20--28",
  month =        jul # "\slash " # aug,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3268573",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 14 06:30:26 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Roman:2023:CPS,
  author =       "Rodrigo Roman and Cristina Alcaraz and Javier Lopez
                 and Kouichi Sakurai",
  title =        "Current Perspectives on Securing Critical
                 Infrastructures Supply Chains",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "4",
  pages =        "29--38",
  month =        jul # "\slash " # aug,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3247946",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 14 06:30:26 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Doumanidis:2023:DIC,
  author =       "Constantine Doumanidis and Yongyu Xie and Prashant H.
                 N. Rajput and Ryan Pickren and Burak Sahin and Saman
                 Zonouz and Michail Maniatakos",
  title =        "Dissecting the Industrial Control Systems Software
                 Supply Chain",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "4",
  pages =        "39--50",
  month =        jul # "\slash " # aug,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3266775",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 14 06:30:26 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Mathur:2023:RDT,
  author =       "Aditya P. Mathur",
  title =        "Reconfigurable Digital Twin to Support Research,
                 Education, and Training in the Defense of Critical
                 Infrastructure",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "4",
  pages =        "51--60",
  month =        jul # "\slash " # aug,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3281272",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 14 06:30:26 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Strohmeier:2023:PAC,
  author =       "Martin Strohmeier and Mauro Leonardi and Sergei
                 Markochev and Fabio Ricciato and Matthias Sch{\"a}fer
                 and Vincent Lenders",
  title =        "In Pursuit of Aviation Cybersecurity: Experiences and
                 Lessons From a Competitive Approach",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "4",
  pages =        "61--73",
  month =        jul # "\slash " # aug,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3265523",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 14 06:30:26 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Sarieddine:2023:RTC,
  author =       "Khaled Sarieddine and Mohammad Ali Sayed and Danial
                 Jafarigiv and Ribal Atallah and Mourad Debbabi and
                 Chadi Assi",
  title =        "A Real-Time Cosimulation Testbed for Electric Vehicle
                 Charging and Smart Grid Security",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "4",
  pages =        "74--83",
  month =        jul # "\slash " # aug,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3247374",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 14 06:30:26 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Anonymous:2023:ICSk,
  author =       "Anonymous",
  title =        "{IEEE Computer Society} Member Benefits",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "4",
  pages =        "83--83",
  month =        jul # "\slash " # aug,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3288402",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 14 06:30:26 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Nicol:2023:TCW,
  author =       "David M. Nicol and Gregory Shannon and Monika Akbar
                 and Matt Bishop and Michael Chaney and Matthew
                 Luallen",
  title =        "Toward Common Weakness Enumerations in Industrial
                 Control Systems",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "4",
  pages =        "84--93",
  month =        jul # "\slash " # aug,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3279515",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 14 06:30:26 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Smart:2023:CED,
  author =       "Nigel Smart",
  title =        "Computing on Encrypted Data",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "4",
  pages =        "94--98",
  month =        jul # "\slash " # aug,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3279517",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 14 06:30:26 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2020.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Anonymous:2023:RPc,
  author =       "Anonymous",
  title =        "Over the Rainbow Podcast",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "4",
  pages =        "99--99",
  month =        jul # "\slash " # aug,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3291732",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 14 06:30:26 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Bellovin:2023:CLL,
  author =       "Steven M. Bellovin",
  title =        "Is Cybersecurity Liability a Liability?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "4",
  pages =        "99--100",
  month =        jul # "\slash " # aug,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3273461",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 14 06:30:26 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Anonymous:2023:ICSl,
  author =       "Anonymous",
  title =        "{IEEE Computer Society} Information",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "4",
  pages =        "C3--C3",
  month =        jul # "\slash " # aug,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3282527",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 14 06:30:26 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Anonymous:2023:ICEc,
  author =       "Anonymous",
  title =        "{IEEE} Computing Edge",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "4",
  pages =        "C4--C4",
  month =        jul # "\slash " # aug,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3288403",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 14 06:30:26 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Anonymous:2023:FCe,
  author =       "Anonymous",
  title =        "Front Cover",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "5",
  pages =        "C1--C1",
  month =        sep # "\slash " # oct,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3301249",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 14 06:30:26 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Anonymous:2023:TCe,
  author =       "Anonymous",
  title =        "Table of Contents",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "5",
  pages =        "1--2",
  month =        sep # "\slash " # oct,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3301251",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 14 06:30:26 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Anonymous:2023:Me,
  author =       "Anonymous",
  title =        "Masthead",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "5",
  pages =        "3--3",
  month =        sep # "\slash " # oct,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3301253",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 14 06:30:26 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Kohno:2023:YE,
  author =       "Tadayoshi Kohno",
  title =        "In Your Eyes",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "5",
  pages =        "4--5",
  month =        sep # "\slash " # oct,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3295440",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 14 06:30:26 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Wu:2023:CSD,
  author =       "Jingwei Wu and Wanxi Mao and Yuxin Deng and Jinghong
                 Xu",
  title =        "Child Safety and Data Privacy in Smart Homes With
                 Speakers: Comparison of Privacy Policies in the {United
                 States} and {China}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "5",
  pages =        "6--17",
  month =        sep # "\slash " # oct,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3187946",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 14 06:30:26 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Anonymous:2023:ICSm,
  author =       "Anonymous",
  title =        "{IEEE Computer Society} Call for Papers",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "5",
  pages =        "17--17",
  month =        sep # "\slash " # oct,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3304768",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 14 06:30:26 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Majeed:2023:RSS,
  author =       "Abdul Majeed and Seong Oun Hwang",
  title =        "Rectification of Syntactic and Semantic Privacy
                 Mechanisms",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "5",
  pages =        "18--32",
  month =        sep # "\slash " # oct,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3188365",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 14 06:30:26 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Nanayakkara:2023:WDC,
  author =       "Priyanka Nanayakkara and Jessica Hullman",
  title =        "What's Driving Conflicts Around Differential Privacy
                 for the {U.S. Census}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "5",
  pages =        "33--42",
  month =        sep # "\slash " # oct,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2022.3202793",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 14 06:30:26 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Obermeier:2023:ARM,
  author =       "Sebastian Obermeier and Thomas J{\"o}sler and Stephan
                 Renggli and Maurus Untern{\"a}hrer and Bernhard M.
                 H{\"a}mmerli",
  title =        "Automating Recovery in Mixed Operation
                 Technology\slash {IT} Critical Infrastructures",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "5",
  pages =        "43--54",
  month =        sep # "\slash " # oct,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3264595",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 14 06:30:26 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Ruzomberka:2023:COB,
  author =       "Eric Ruzomberka and David J. Love and Christopher G.
                 Brinton and Arpit Gupta and Chih-Chun Wang and H.
                 Vincent Poor",
  title =        "Challenges and Opportunities for {Beyond-5G} Wireless
                 Security",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "5",
  pages =        "55--66",
  month =        sep # "\slash " # oct,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3251888",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 14 06:30:26 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Anonymous:2023:ICC,
  author =       "Anonymous",
  title =        "{IEEE} Career Center",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "5",
  pages =        "67--67",
  month =        sep # "\slash " # oct,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3304769",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 14 06:30:26 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Krishnan:2023:WSA,
  author =       "Padmanabhan Krishnan and Cristina Cifuentes and Li Li
                 and Tegawend{\'e} F. Bissyand{\'e} and Jacques Klein",
  title =        "Why Is Static Application Security Testing Hard to
                 Learn?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "5",
  pages =        "68--72",
  month =        sep # "\slash " # oct,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3287206",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 14 06:30:26 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Arp:2023:LLM,
  author =       "Daniel Arp and Erwin Quiring and Feargus Pendlebury
                 and Alexander Warnecke and Fabio Pierazzi and Christian
                 Wressnegger and Lorenzo Cavallaro and Konrad Rieck",
  title =        "Lessons Learned on Machine Learning for Computer
                 Security",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "5",
  pages =        "72--77",
  month =        sep # "\slash " # oct,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3287207",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 14 06:30:26 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Anonymous:2023:IRS,
  author =       "Anonymous",
  title =        "{IEEE Reliability Society}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "5",
  pages =        "77--77",
  month =        sep # "\slash " # oct,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3306197",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 14 06:30:26 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Anonymous:2023:ICSn,
  author =       "Anonymous",
  title =        "{IEEE Computer Society} Diversity and Inclusion",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "5",
  pages =        "78--78",
  month =        sep # "\slash " # oct,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3304770",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 14 06:30:26 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Piessens:2023:TEA,
  author =       "Frank Piessens",
  title =        "Transient Execution Attacks",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "5",
  pages =        "79--84",
  month =        sep # "\slash " # oct,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3299349",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 14 06:30:26 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Adamos:2023:AEU,
  author =       "Konstantinos Adamos and Fabio {Di Franco} and
                 Athanasios Grammatopoulos",
  title =        "An Analysis of {European Union} Cybersecurity Higher
                 Education Programs Through the Crowd-Sourced Database
                 {CyberHEAD}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "5",
  pages =        "85--94",
  month =        sep # "\slash " # oct,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3299348",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 14 06:30:26 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Geer:2023:CO,
  author =       "Daniel E. Geer",
  title =        "Convergence: Ongoing",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "5",
  pages =        "95--96",
  month =        sep # "\slash " # oct,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3295439",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 14 06:30:26 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Anonymous:2023:ICSo,
  author =       "Anonymous",
  title =        "{IEEE Computer Society} Member Benefits",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "5",
  pages =        "C3--C3",
  month =        sep # "\slash " # oct,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3301255",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 14 06:30:26 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Anonymous:2023:ICEd,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Computing Edge}}}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "5",
  pages =        "C4--C4",
  month =        sep # "\slash " # oct,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3304772",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Thu Sep 14 06:30:26 2023",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Anonymous:2023:FCf,
  author =       "Anonymous",
  title =        "Front Cover",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "6",
  pages =        "C1--C1",
  month =        nov # "\slash " # dec,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3315876",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Apr 10 08:11:06 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Anonymous:2023:ICSp,
  author =       "Anonymous",
  title =        "{IEEE Computer Society} Diversity filler",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "6",
  pages =        "C2--C2",
  month =        nov # "\slash " # dec,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3324515",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Apr 10 08:11:06 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Anonymous:2023:TCf,
  author =       "Anonymous",
  title =        "Table of Contents",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "6",
  pages =        "1--2",
  month =        nov # "\slash " # dec,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3315878",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Apr 10 08:11:06 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Anonymous:2023:Mf,
  author =       "Anonymous",
  title =        "Masthead",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "6",
  pages =        "3--3",
  month =        nov # "\slash " # dec,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3315880",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Apr 10 08:11:06 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Zurko:2023:USA,
  author =       "Mary Ellen Zurko",
  title =        "Unusable Security for Attackers [From the {Editors}]",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "6",
  pages =        "4--7",
  month =        nov # "\slash " # dec,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3308648",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Apr 10 08:11:06 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Anonymous:2023:RSe,
  author =       "Anonymous",
  title =        "Reliability Society",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "6",
  pages =        "5--5",
  month =        nov # "\slash " # dec,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3315882",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Apr 10 08:11:06 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Anonymous:2023:ISPb,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Security \& Privacy}}} Subscribe
                 filler",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "6",
  pages =        "7--7",
  month =        nov # "\slash " # dec,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3324567",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Apr 10 08:11:06 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Massacci:2023:SSC,
  author =       "Fabio Massacci and Laurie Williams",
  title =        "Software Supply Chain Security [{Guest Editors}
                 Introduction]",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "6",
  pages =        "8--10",
  month =        nov # "\slash " # dec,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3321189",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Apr 10 08:11:06 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
  keywords =     "Computer security; Software; Special issues and
                 sections; Supply chain management",
}

@Article{Anonymous:2023:ICSq,
  author =       "Anonymous",
  title =        "{IEEE Computer Society} Has You Covered",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "6",
  pages =        "10--10",
  month =        nov # "\slash " # dec,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3324513",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Apr 10 08:11:06 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Anonymous:2023:ICSr,
  author =       "Anonymous",
  title =        "{IEEE Computer Society Career Center} filler",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "6",
  pages =        "11--11",
  month =        nov # "\slash " # dec,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3324514",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Apr 10 08:11:06 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Balliu:2023:CPS,
  author =       "Musard Balliu and Benoit Baudry and Sofia Bobadilla
                 and Mathias Ekstedt and Martin Monperrus and Javier Ron
                 and Aman Sharma and Gabriel Skoglund and C{\'e}sar
                 Soto-Valero and Martin Wittlinger",
  title =        "Challenges of Producing Software Bill of Materials for
                 {Java}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "6",
  pages =        "12--23",
  month =        nov # "\slash " # dec,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3302956",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Apr 10 08:11:06 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib;
                 https://www.math.utah.edu/pub/tex/bib/java2020.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
  keywords =     "Bills of materials; Java; Production; Software;
                 Software reliability; Standards; Supply chain
                 management",
}

@Article{Anonymous:2023:ICSs,
  author =       "Anonymous",
  title =        "{IEEE Computer Society} {CFP} filler",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "6",
  pages =        "23--23",
  month =        nov # "\slash " # dec,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3324566",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Apr 10 08:11:06 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Milankovich:2023:DSC,
  author =       "{\'A}kos Mil{\'a}nkovich and Katja Tuma",
  title =        "Delta Security Certification for Software Supply
                 Chains",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "6",
  pages =        "24--33",
  month =        nov # "\slash " # dec,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3311464",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Apr 10 08:11:06 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
  keywords =     "Certification; Codes; Computer security; Europe;
                 Software; Source coding; Supply chain management",
}

@Article{Ladisa:2023:JCS,
  author =       "Piergiorgio Ladisa and Serena Elisa Ponta and Antonino
                 Sabetta and Matias Martinez and Olivier Barais",
  title =        "Journey to the Center of Software Supply Chain
                 Attacks",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "6",
  pages =        "34--49",
  month =        nov # "\slash " # dec,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3302066",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Apr 10 08:11:06 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
  keywords =     "Codes; Malware; Security; Software; Stakeholders;
                 Supply chain management; Taxonomy",
}

@Article{Torres-Arias:2023:VKS,
  author =       "Santiago Torres-Arias and Dan Geer and John Speed
                 Meyers",
  title =        "A Viewpoint on Knowing Software: Bill of Materials
                 Quality When You See It",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "6",
  pages =        "50--54",
  month =        nov # "\slash " # dec,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3315887",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Apr 10 08:11:06 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
  keywords =     "Bills of materials; Privacy; Quality assessment;
                 Security; Software; Supply chain management",
}

@Article{Melara:2023:VSS,
  author =       "Marcela S. Melara and Santiago Torres-Arias",
  title =        "A Viewpoint on Software Supply Chain Security: Are We
                 Getting Lost in Translation?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "6",
  pages =        "55--58",
  month =        nov # "\slash " # dec,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3316568",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Apr 10 08:11:06 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
  keywords =     "Cultural aspects; Linguistics; Natural language
                 processing; Privacy; Risk management; Security; Social
                 factors; Software development management; Supply chain
                 management",
}

@Article{Fourne:2023:VHF,
  author =       "Marcel Fourn{\'e} and Dominik Wermke and Sascha Fahl
                 and Yasemin Acar",
  title =        "A Viewpoint on Human Factors in Software Supply Chain
                 Security: a Research Agenda",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "6",
  pages =        "59--63",
  month =        nov # "\slash " # dec,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3316569",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Apr 10 08:11:06 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
  keywords =     "Human factors; Privacy; Security; Software; Supply
                 chain management",
}

@Article{Eckhart:2023:SED,
  author =       "Matthias Eckhart and Andreas Ekelhart and David
                 Allison and Magnus Almgren and Katharina Ceesay-Seitz
                 and Helge Janicke and Simin Nadjm-Tehrani and Awais
                 Rashid and Mark Yampolskiy",
  title =        "Security-Enhancing Digital Twins: Characteristics,
                 Indicators, and Future Perspectives",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "6",
  pages =        "64--75",
  month =        nov # "\slash " # dec,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3271225",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Apr 10 08:11:06 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
  keywords =     "Behavioral sciences; Cyber-physical systems; Digital
                 twins; Emulation; Mathematical models; Network systems;
                 Security; Testing",
}

@Article{Zahan:2023:OSP,
  author =       "Nusrat Zahan and Parth Kanakiya and Brian Hambleton
                 and Shohanuzzaman Shohan and Laurie Williams",
  title =        "{OpenSSF} Scorecard: On the Path Toward Ecosystem-Wide
                 Automated Security Metrics",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "6",
  pages =        "76--88",
  month =        nov # "\slash " # dec,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3279773",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Apr 10 08:11:06 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
  keywords =     "Ecosystems; Open source software; Security; Software
                 development management; Software measurement;
                 Standards; Task analysis",
}

@Article{Anonymous:2023:ICSt,
  author =       "Anonymous",
  title =        "{IEEE Computer Society} Seeks Applicants for {Editors
                 in Chief}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "6",
  pages =        "89--89",
  month =        nov # "\slash " # dec,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3324516",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Apr 10 08:11:06 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Kerschbaum:2023:PPM,
  author =       "Florian Kerschbaum and Nils Lukas",
  title =        "Privacy-Preserving Machine Learning [Cryptography]",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "6",
  pages =        "90--94",
  month =        nov # "\slash " # dec,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3315944",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Apr 10 08:11:06 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/cryptography2020.bib;
                 https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
  keywords =     "Computational modeling; Cryptography; Data integrity;
                 Data models; Differential privacy; Distributed
                 databases; Federated learning; Machine learning;
                 Privacy; Soft sensors; Training",
}

@Article{Anonymous:2023:IAF,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Annals}}} filler",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "6",
  pages =        "94--94",
  month =        nov # "\slash " # dec,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3324560",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Apr 10 08:11:06 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{xx-90315775,
  author =       "Anonymous",
  title =        "0",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "6",
  pages =        "95--95",
  month =        nov # "\slash " # dec,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3324561",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Apr 10 08:11:06 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Schneier:2023:TAM,
  author =       "Bruce Schneier",
  title =        "Trustworthy {AI} Means Public {AI} [Last Word]",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "6",
  pages =        "95--96",
  month =        nov # "\slash " # dec,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3301262",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Apr 10 08:11:06 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Anonymous:2023:ICSu,
  author =       "Anonymous",
  title =        "{IEEE Computer Society} Information",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "6",
  pages =        "C3--C3",
  month =        nov # "\slash " # dec,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3315884",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Apr 10 08:11:06 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Anonymous:2023:CE,
  author =       "Anonymous",
  title =        "{{\booktitle{Computing Edge}}}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "21",
  number =       "6",
  pages =        "C4--C4",
  month =        nov # "\slash " # dec,
  year =         "2023",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3324563",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Apr 10 08:11:06 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Anonymous:2024:FCa,
  author =       "Anonymous",
  title =        "Front Cover",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "22",
  number =       "1",
  pages =        "C1--C1",
  month =        jan # "\slash " # feb,
  year =         "2024",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3337929",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Apr 10 08:11:06 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Anonymous:2024:ICSa,
  author =       "Anonymous",
  title =        "{IEEE Computer Society} Diversity and Inclusion Fund",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "22",
  number =       "1",
  pages =        "C2--C2",
  month =        jan # "\slash " # feb,
  year =         "2024",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3343884",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Apr 10 08:11:06 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Anonymous:2024:TCa,
  author =       "Anonymous",
  title =        "Table of Contents",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "22",
  number =       "1",
  pages =        "1--2",
  month =        jan # "\slash " # feb,
  year =         "2024",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3337931",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Apr 10 08:11:06 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Anonymous:2024:Ma,
  author =       "Anonymous",
  title =        "Masthead",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "22",
  number =       "1",
  pages =        "3--3",
  month =        jan # "\slash " # feb,
  year =         "2024",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3337933",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Apr 10 08:11:06 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Massacci:2024:HGV,
  author =       "Fabio Massacci",
  title =        "The Holy Grail of Vulnerability Predictions",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "22",
  number =       "1",
  pages =        "4--6",
  month =        jan # "\slash " # feb,
  year =         "2024",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3333936",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Apr 10 08:11:06 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Anonymous:2024:IRSa,
  author =       "Anonymous",
  title =        "{IEEE Reliability Society}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "22",
  number =       "1",
  pages =        "5--5",
  month =        jan # "\slash " # feb,
  year =         "2024",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3337935",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Apr 10 08:11:06 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Roesner:2024:SPM,
  author =       "Franziska Roesner and Tadayoshi Kohno",
  title =        "Security and Privacy in the Metaverse",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "22",
  number =       "1",
  pages =        "7--9",
  month =        jan # "\slash " # feb,
  year =         "2024",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3333989",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Apr 10 08:11:06 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
  keywords =     "Augmented reality; Extended reality; Metaverse;
                 Privacy; Security; Social implications of technology;
                 Special issues and sections; Virtual reality",
}

@Article{Anonymous:2024:ICSb,
  author =       "Anonymous",
  title =        "{IEEE Computer Society} Benefits",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "22",
  number =       "1",
  pages =        "9--9",
  month =        jan # "\slash " # feb,
  year =         "2024",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3343885",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Apr 10 08:11:06 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Cayir:2024:ASP,
  author =       "Derin Cayir and Abbas Acar and Riccardo Lazzeretti and
                 Marco Angelini and Mauro Conti and Selcuk Uluagac",
  title =        "Augmenting Security and Privacy in the Virtual Realm:
                 an Analysis of Extended Reality Devices",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "22",
  number =       "1",
  pages =        "10--23",
  month =        jan # "\slash " # feb,
  year =         "2024",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3332004",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Apr 10 08:11:06 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
  keywords =     "Augmented reality; Cameras; Cyberattack; Gaze
                 tracking; Mixed reality; Privacy; Security; Virtual
                 reality; X reality",
}

@Article{Nair:2024:TMU,
  author =       "Vivek Nair and Louis Rosenberg and James F. O Brien
                 and Dawn Song",
  title =        "Truth in Motion: The Unprecedented Risks and
                 Opportunities of Extended Reality Motion Data",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "22",
  number =       "1",
  pages =        "24--32",
  month =        jan # "\slash " # feb,
  year =         "2024",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3330392",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Apr 10 08:11:06 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
  keywords =     "Extended reality; Fingerprint recognition; Metaverse;
                 Motion measurement; Privacy; Security; Telemetry;
                 Tracking; X reality",
}

@Article{Corbett:2024:SBP,
  author =       "Matthew Corbett and Brendan David-John and Jiacheng
                 Shang and Y. Charlie Hu and Bo Ji",
  title =        "Securing Bystander Privacy in Mixed Reality While
                 Protecting the User Experience",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "22",
  number =       "1",
  pages =        "33--42",
  month =        jan # "\slash " # feb,
  year =         "2024",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3331649",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Apr 10 08:11:06 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
  keywords =     "Augmented reality; Cameras; Information analysis;
                 Information integrity; Metaverse; Mixed reality;
                 Privacy; Recording; Technological innovation; User
                 experience; Visualization",
}

@Article{Anonymous:2024:ICSc,
  author =       "Anonymous",
  title =        "{IEEE Computer Society} Call for Papers",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "22",
  number =       "1",
  pages =        "42--42",
  month =        jan # "\slash " # feb,
  year =         "2024",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3343886",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Apr 10 08:11:06 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Mhaidli:2024:SML,
  author =       "Abraham Mhaidli and Shwetha Rajaram and Selin Fidan
                 and Gina Herakovic and Florian Schaub",
  title =        "Shockvertising, Malware, and a Lack of Accountability:
                 Exploring Consumer Risks of Virtual Reality
                 Advertisements and Marketing Experiences",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "22",
  number =       "1",
  pages =        "43--52",
  month =        jan # "\slash " # feb,
  year =         "2024",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3332105",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Apr 10 08:11:06 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
  keywords =     "Advertising; Business; Data collection; Data privacy;
                 Motion pictures; Privacy; Risk management; Task
                 analysis; Virtual reality",
}

@Article{Brehm:2024:UPV,
  author =       "Karoline Brehm and Yan Shvartzshnaider",
  title =        "Understanding Privacy in Virtual Reality Classrooms: a
                 Contextual Integrity Perspective",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "22",
  number =       "1",
  pages =        "53--62",
  month =        jan # "\slash " # feb,
  year =         "2024",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3336802",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Apr 10 08:11:06 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
  keywords =     "Advertising; Data privacy; Education; Information
                 processing; Privacy; Security; Sensors; Virtual
                 environments; Virtual reality",
}

@Article{Anonymous:2024:IRP,
  author =       "Anonymous",
  title =        "{IEEE Over the Rainbow} Podcast",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "22",
  number =       "1",
  pages =        "62--62",
  month =        jan # "\slash " # feb,
  year =         "2024",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3343887",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Apr 10 08:11:06 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Anonymous:2024:PSE,
  author =       "Anonymous",
  title =        "Publications Seek 2025 {Editors in Chief}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "22",
  number =       "1",
  pages =        "63--63",
  month =        jan # "\slash " # feb,
  year =         "2024",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3343928",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Apr 10 08:11:06 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Hagan:2024:VSI,
  author =       "Joseph O Hagan and Jan Gugenheimer and Florian Mathis
                 and Jolie Bonner and Richard Jones and Mark McGill",
  title =        "A Viewpoint on the Societal Impact of Everyday
                 Augmented Reality and the Need for Perceptual Human
                 Rights",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "22",
  number =       "1",
  pages =        "64--68",
  month =        jan # "\slash " # feb,
  year =         "2024",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3333988",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Apr 10 08:11:06 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
  keywords =     "Advertising; Augmented reality; Business; Extended
                 reality; Headphones; Media; Metaverse; Privacy; Smart
                 phones; Social factors; Social implications of
                 technology",
}

@Article{Bodden:2024:EST,
  author =       "Eric Bodden and Jens Pottebaum and Markus Fockel and
                 Iris Gr{\"a}{\ss}ler",
  title =        "Evaluating Security Through Isolation and Defense in
                 Depth",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "22",
  number =       "1",
  pages =        "69--72",
  month =        jan # "\slash " # feb,
  year =         "2024",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3336028",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Apr 10 08:11:06 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
  keywords =     "Codes; Performance evaluation; Privacy; Security;
                 Software systems; Trustless services",
}

@Article{Anonymous:2024:ICSd,
  author =       "Anonymous",
  title =        "{IEEE Computer Society} Information",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "22",
  number =       "1",
  pages =        "73--73",
  month =        jan # "\slash " # feb,
  year =         "2024",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3337937",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Apr 10 08:11:06 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Redmiles:2024:FMB,
  author =       "Elissa M. Redmiles",
  title =        "Friction Matters: Balancing the Pursuit of Perfect
                 Protection With Target Hardening",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "22",
  number =       "1",
  pages =        "76--75",
  month =        jan # "\slash " # feb,
  year =         "2024",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3333972",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Apr 10 08:11:06 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Anonymous:2024:IAC,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Annals in Computing}}}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "22",
  number =       "1",
  pages =        "75--75",
  month =        jan # "\slash " # feb,
  year =         "2024",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3343929",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Apr 10 08:11:06 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Anonymous:2024:ICC,
  author =       "Anonymous",
  title =        "{IEEE Career Center}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "22",
  number =       "1",
  pages =        "C3--C3",
  month =        jan # "\slash " # feb,
  year =         "2024",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3343930",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Apr 10 08:11:06 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Anonymous:2024:ICEa,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Computing Edge}}}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "22",
  number =       "1",
  pages =        "C4--C4",
  month =        jan # "\slash " # feb,
  year =         "2024",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3343931",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Apr 10 08:11:06 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Anonymous:2024:FCb,
  author =       "Anonymous",
  title =        "Front Cover",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "22",
  number =       "2",
  pages =        "C1--C1",
  month =        mar # "\slash " # apr,
  year =         "2024",
  DOI =          "https://doi.org/10.1109/MSEC.2024.3359789",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Apr 10 08:11:06 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Anonymous:2024:ICSe,
  author =       "Anonymous",
  title =        "{IEEE Computer Society Diversity and Inclusion Fund}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "22",
  number =       "2",
  pages =        "C2--C2",
  month =        mar # "\slash " # apr,
  year =         "2024",
  DOI =          "https://doi.org/10.1109/MSEC.2024.3369424",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Apr 10 08:11:06 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Anonymous:2024:TCb,
  author =       "Anonymous",
  title =        "Table of Contents",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "22",
  number =       "2",
  pages =        "1--2",
  month =        mar # "\slash " # apr,
  year =         "2024",
  DOI =          "https://doi.org/10.1109/MSEC.2024.3359791",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Apr 10 08:11:06 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Anonymous:2024:Mb,
  author =       "Anonymous",
  title =        "Masthead",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "22",
  number =       "2",
  pages =        "3--3",
  month =        mar # "\slash " # apr,
  year =         "2024",
  DOI =          "https://doi.org/10.1109/MSEC.2024.3359793",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Apr 10 08:11:06 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Williams:2024:NSS,
  author =       "Laurie Williams",
  title =        "Narrowing the Software Supply Chain Attack Vectors:
                 The {SSDF} Is Wonderful but not Enough",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "22",
  number =       "2",
  pages =        "4--7",
  month =        mar # "\slash " # apr,
  year =         "2024",
  DOI =          "https://doi.org/10.1109/MSEC.2024.3359798",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Apr 10 08:11:06 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Anonymous:2024:IRSb,
  author =       "Anonymous",
  title =        "{IEEE Reliability Society}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "22",
  number =       "2",
  pages =        "5--5",
  month =        mar # "\slash " # apr,
  year =         "2024",
  DOI =          "https://doi.org/10.1109/MSEC.2024.3359797",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Apr 10 08:11:06 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Anonymous:2024:ITC,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Transactions on Computers}}}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "22",
  number =       "2",
  pages =        "7--7",
  month =        mar # "\slash " # apr,
  year =         "2024",
  DOI =          "https://doi.org/10.1109/MSEC.2024.3369425",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Apr 10 08:11:06 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Aiello:2024:SAS,
  author =       "Samuel Aiello and Bhaskar P. Rimal",
  title =        "Secure Access Service Edge Convergence: Recent
                 Progress and Open Issues",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "22",
  number =       "2",
  pages =        "8--16",
  month =        mar # "\slash " # apr,
  year =         "2024",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3326811",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Apr 10 08:11:06 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
  keywords =     "Cloud computing; Data centers; Digital systems;
                 Enterprise architecture management; Industries;
                 Internet of Things; Security; Zero Trust",
}

@Article{Hamilton:2024:SDI,
  author =       "Vaughn Hamilton and Gabriel Kaptchuk and Allison
                 McDonald and Elissa M. Redmiles",
  title =        "Safer Digital Intimacy for Sex Workers and Beyond: a
                 Technical Research Agenda",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "22",
  number =       "2",
  pages =        "17--28",
  month =        mar # "\slash " # apr,
  year =         "2024",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3324615",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Apr 10 08:11:06 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
  keywords =     "Digital images; Face recognition; Media; Personnel;
                 Privacy; Safety; Social networking (online); Threat
                 modeling; Videos",
}

@Article{Lyon:2024:TDS,
  author =       "Gregory Lyon",
  title =        "Trust in Data Security Protocols and Knowledge of
                 Privacy and Security Technology",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "22",
  number =       "2",
  pages =        "29--37",
  month =        mar # "\slash " # apr,
  year =         "2024",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3329739",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Apr 10 08:11:06 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
  keywords =     "Behavioral sciences; Companies; Data privacy; Data
                 security; Privacy; Security; Surveys; Trusted
                 computing",
}

@Article{Anonymous:2024:ICSf,
  author =       "Anonymous",
  title =        "{IEEE Computer Society} --- Call for Papers",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "22",
  number =       "2",
  pages =        "37--37",
  month =        mar # "\slash " # apr,
  year =         "2024",
  DOI =          "https://doi.org/10.1109/MSEC.2024.3369426",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Apr 10 08:11:06 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Mbaka:2024:RGE,
  author =       "Winnie Mbaka and Katja Tuma",
  title =        "Role of Gender in the Evaluation of Security
                 Decisions",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "22",
  number =       "2",
  pages =        "38--48",
  month =        mar # "\slash " # apr,
  year =         "2024",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3343837",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Apr 10 08:11:06 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
  keywords =     "Behavioral sciences; Computer security; Decision
                 making; Education; Ethics; Gender issues; Human
                 factors; Security; Surveys",
}

@Article{Anonymous:2024:IAH,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Annals of the History of
                 Computing}}}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "22",
  number =       "2",
  pages =        "48--48",
  month =        mar # "\slash " # apr,
  year =         "2024",
  DOI =          "https://doi.org/10.1109/MSEC.2024.3369428",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Apr 10 08:11:06 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Sabetta:2024:KVO,
  author =       "Antonino Sabetta and Serena Elisa Ponta and Rocio
                 Cabrera Lozoya and Michele Bezzi and Tommaso Sacchetti
                 and Matteo Greco and Gerg Balogh and P{\'e}ter Heged s
                 and Rudolf Ferenc and Ranindya Paramitha and Ivan
                 Pashchenko and Aurora Papotti and {\'A}kos
                 Mil{\'a}nkovich and Fabio Massacci",
  title =        "Known Vulnerabilities of Open Source Projects: Where
                 Are the Fixes?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "22",
  number =       "2",
  pages =        "49--59",
  month =        mar # "\slash " # apr,
  year =         "2024",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3343836",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Apr 10 08:11:06 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
  keywords =     "Codes; Data mining; Databases; Knowledge based
                 systems; Metadata; Open source software; Security;
                 Source coding",
}

@Article{Anonymous:2024:ICG,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Computer Graphics and
                 Applications}}}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "22",
  number =       "2",
  pages =        "59--59",
  month =        mar # "\slash " # apr,
  year =         "2024",
  DOI =          "https://doi.org/10.1109/MSEC.2024.3369434",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Apr 10 08:11:06 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Bezzi:2024:LLM,
  author =       "Michele Bezzi",
  title =        "Large Language Models and Security",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "22",
  number =       "2",
  pages =        "60--68",
  month =        mar # "\slash " # apr,
  year =         "2024",
  DOI =          "https://doi.org/10.1109/MSEC.2023.3345568",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Apr 10 08:11:06 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
  keywords =     "Computational modeling; Costs; Electronic mail; Fake
                 news; Large language models; Malware; Phishing;
                 Security",
}

@Article{Anonymous:2024:CSE,
  author =       "Anonymous",
  title =        "{{\booktitle{Computing in Science \& Engineering}}}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "22",
  number =       "2",
  pages =        "68--68",
  month =        mar # "\slash " # apr,
  year =         "2024",
  DOI =          "https://doi.org/10.1109/MSEC.2024.3369435",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Apr 10 08:11:06 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Backendal:2024:EEE,
  author =       "Matilda Backendal and Miro Haller and Kenny Paterson",
  title =        "End-to-End Encrypted Cloud Storage",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "22",
  number =       "2",
  pages =        "69--74",
  month =        mar # "\slash " # apr,
  year =         "2024",
  DOI =          "https://doi.org/10.1109/MSEC.2024.3352788",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Apr 10 08:11:06 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
  keywords =     "Cloud computing; Data privacy; Encryption; Face
                 recognition; Focusing; Privacy; Secure storage; Storage
                 management; Surveys",
}

@Article{Anonymous:2024:ITB,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Transactions on Big Data}}}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "22",
  number =       "2",
  pages =        "74--74",
  month =        mar # "\slash " # apr,
  year =         "2024",
  DOI =          "https://doi.org/10.1109/MSEC.2024.3369436",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Apr 10 08:11:06 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Piessens:2024:SCA,
  author =       "Frank Piessens and Paul C. van Oorschot",
  title =        "Side-Channel Attacks: a Short Tour",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "22",
  number =       "2",
  pages =        "75--80",
  month =        mar # "\slash " # apr,
  year =         "2024",
  DOI =          "https://doi.org/10.1109/MSEC.2024.3352848",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Apr 10 08:11:06 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
  keywords =     "Computer security; Privacy; Side-channel attacks",
}

@Article{Anonymous:2024:ITS,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Transactions on Sustainable
                 Computing}}}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "22",
  number =       "2",
  pages =        "80--80",
  month =        mar # "\slash " # apr,
  year =         "2024",
  DOI =          "https://doi.org/10.1109/MSEC.2024.3369437",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Apr 10 08:11:06 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Hutchings:2024:AOD,
  author =       "Alice Hutchings",
  title =        "The Amplification of Online Deviancy Through the
                 Language of Violent Crime, War, and Aggression",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "22",
  number =       "2",
  pages =        "81--84",
  month =        mar # "\slash " # apr,
  year =         "2024",
  DOI =          "https://doi.org/10.1109/MSEC.2024.3353428",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Apr 10 08:11:06 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
  keywords =     "Computer crime; Computer hacking; Computer science;
                 Computer security; Law enforcement; Online services;
                 Privacy; Social implications of technology; Trojan
                 horses; Visualization",
}

@Article{Anonymous:2024:ICSg,
  author =       "Anonymous",
  title =        "{IEEE Computer Society} Has You Covered!",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "22",
  number =       "2",
  pages =        "85--85",
  month =        mar # "\slash " # apr,
  year =         "2024",
  DOI =          "https://doi.org/10.1109/MSEC.2024.3369439",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Apr 10 08:11:06 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Pallas:2024:PEP,
  author =       "Frank Pallas and Katharina Koerner and Isabel
                 Barber{\'a} and Jaap-Henk Hoepman and Meiko Jensen and
                 Nandita Rao Narla and Nikita Samarin and Max-R.
                 Ulbricht and Isabel Wagner and Kim Wuyts and Christian
                 Zimmermann",
  title =        "Privacy Engineering From Principles to Practice: a
                 Roadmap",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "22",
  number =       "2",
  pages =        "86--92",
  month =        mar # "\slash " # apr,
  year =         "2024",
  DOI =          "https://doi.org/10.1109/MSEC.2024.3363829",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Apr 10 08:11:06 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
  keywords =     "Engineering profession; Industries; Information
                 systems; Privacy",
}

@Article{Anonymous:2024:ICSh,
  author =       "Anonymous",
  title =        "{IEEE Computer Society} Information",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "22",
  number =       "2",
  pages =        "93--93",
  month =        mar # "\slash " # apr,
  year =         "2024",
  DOI =          "https://doi.org/10.1109/MSEC.2024.3359795",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Apr 10 08:11:06 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Nissenbaum:2024:ASP,
  author =       "Helen Nissenbaum",
  title =        "{AI} Safety: a Poisoned Chalice?",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "22",
  number =       "2",
  pages =        "94--96",
  month =        mar # "\slash " # apr,
  year =         "2024",
  DOI =          "https://doi.org/10.1109/MSEC.2024.3356848",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Apr 10 08:11:06 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Anonymous:2024:IPC,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Pervasive Computing}}} --- Call for
                 Articles",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "22",
  number =       "2",
  pages =        "95--95",
  month =        mar # "\slash " # apr,
  year =         "2024",
  DOI =          "https://doi.org/10.1109/MSEC.2024.3369438",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Apr 10 08:11:06 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Anonymous:2024:ICSi,
  author =       "Anonymous",
  title =        "{IEEE Computer Society Career Center}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "22",
  number =       "2",
  pages =        "C3--C3",
  month =        mar # "\slash " # apr,
  year =         "2024",
  DOI =          "https://doi.org/10.1109/MSEC.2024.3369440",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Apr 10 08:11:06 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

@Article{Anonymous:2024:ICEb,
  author =       "Anonymous",
  title =        "{{\booktitle{IEEE Computing Edge}}}",
  journal =      j-IEEE-SEC-PRIV,
  volume =       "22",
  number =       "2",
  pages =        "C4--C4",
  month =        mar # "\slash " # apr,
  year =         "2024",
  DOI =          "https://doi.org/10.1109/MSEC.2024.3369441",
  ISSN =         "1540-7993 (print), 1558-4046 (electronic)",
  ISSN-L =       "1540-7993",
  bibdate =      "Wed Apr 10 08:11:06 2024",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "IEEE Security \& Privacy",
  journal-URL =  "https://publications.computer.org/security-and-privacy/",
}

%%% TO DO: Make sure to add missing month data with M-x fix-missing-bimonthly!

%%% ====================================================================
%%% Cross-referenced entries must come last:
@Book{Thorsteinson:2004:NSC,
  author =       "Peter Thorsteinson and G. Gnana Arun Ganesh",
  title =        "{.NET} Security and Cryptography",
  publisher =    pub-PHPTR,
  address =      pub-PHPTR:adr,
  pages =        "xvii + 466",
  year =         "2004",
  ISBN =         "0-13-100851-X",
  ISBN-13 =      "978-0-13-100851-9",
  LCCN =         "????",
  bibdate =      "Wed Aug 04 08:04:36 2004",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib",
  price =        "US\$49.99",
  series =       "The integrated {.NET} series from object innovations",
  acknowledgement = ack-nhfb,
}

@Book{Baase:2003:GFS,
  author =       "Sara Baase",
  title =        "A Gift of Fire: Social, Legal, and Ethical Issues in
                 Computing and the {Internet}",
  publisher =    pub-PEARSON-EDUCATION,
  address =      pub-PEARSON-EDUCATION:adr,
  edition =      "Second",
  pages =        "xv + 464",
  year =         "2003",
  ISBN =         "0-13-008215-5",
  ISBN-13 =      "978-0-13-008215-2",
  LCCN =         "QA76.9.C66 B3 2003",
  bibdate =      "Wed Aug 6 15:09:18 MDT 2008",
  bibsource =    "https://www.math.utah.edu/pub/tex/bib/ieeesecpriv.bib;
                 z3950.loc.gov:7090/Voyager",
  acknowledgement = ack-nhfb,
  remark =       "An Alan R. Apt book.",
  subject =      "Computers; Social aspects; Moral and ethical aspects;
                 Internet",
}