%PDF-1.7
%
1 0 obj
<>stream
application/pdfIEEEIEEE Security & Privacy;2018;16;3;10.1109/MSP.2018.2701158Science of SecurityLetter to the EditorsecuritysciencetheoryLetter to the EditorJohn D. McLeanCormac HerleyP.C. Van Oorschot
IEEE Security & Privacy6 May/June 201831610.1109/MSP.2018.270115810
endstream
endobj
2 0 obj
<>
endobj
3 0 obj
<>stream
H|T{Tg! DG%fX[A ں
>7"F$$ bޯ, oAEE+U[[|-j}ewյ={=;ѿ9s{wq8>cOB/U)S-*29uðN糳'h3O xig{zcn8j,TW)j~̒̚eԫ55T)U2TF%KTIu Q2=U"5RRq( /ʌTJ!W/\O3˙ù#0æLa0>ǂ0,
ñ"00̟>1x ހMwo_}|ԃ0x\8˓<5y))S~Z835cP+|4e6tD\ A$23B^&]'DRBt3̃IVuJRNJj˳e%37%5wZ}?\PA!_w/Ȩ4yLuK甧Ѣx2x5ތ|X0{F:/;+C!(6&-%qY<^EuZvVZuސsTi̲w:X3J7:[lFkyiD<:bb?%ᢁ0gٯȋUu )Kᡊ$DT|ϱOO!1dJ@uܓ7:f&v\|}M
!ԶjYy46}JơCGS})\ZW!29? AmG(&