%PDF-1.4
%
1 0 obj
<>stream
application/pdfIEEEIEEE Transactions on Dependable and Secure Computing;2019;16;6;10.1109/TDSC.2019.2906921Guest Editors’ Introduction: Special Section on Security in Emerging Networking TechnologiesGail-Joon AhnGuofei GuHongxin HuSeungwon Shin
IEEE Transactions on Dependable and Secure Computing9131 Nov.-Dec. 201961610.1109/TDSC.2019.2906921914
endstream
endobj
2 0 obj
<>/Rect[173.31 641.48 174.331 652.422]>>
endobj
3 0 obj
<>stream
8;X]O>EqN@%''O_@%e@?J;%+8(9e>X=MR6S?i^YgA3=].HDXF.R$lIL@"pJ+EP(%0
b]6ajmNZn*!='OQZeQ^Y*,=]?C.B+\Ulg9dhD*"iC[;*=3`oP1[!S^)?1)IZ4dup`
E1r!/,*0[*9.aFIR2&b-C#soRZ7Dl%MLY\.?d>Mn
6%Q2oYfNRF$$+ON<+]RUJmC0InDZ4OTs0S!saG>GGKUlQ*Q?45:CI&4J'_2j$XKrcYp0n+Xl_nU*O(
l[$6Nn+Z_Nq0]s7hs]`XX1nZ8&94a\~>
endstream
endobj
4 0 obj
<>
endobj
5 0 obj
<>/XObject<>/ProcSet[/PDF/Text/ImageB/ImageC/ImageI]/ColorSpace<>/Font<>>>/Thumb 21 0 R/MediaBox[0 0 564.831 771.08]/Rotate 0>>
endobj
6 0 obj
<>
endobj
7 0 obj
<>stream
x[RJ)`TRUItsisΉ={!ֶmy$y}y/Jr~22JHNۃۃx,1?Q&Fxy >iN/:;(j{ӟL@:T6oݖ;4i>Qēب'KOkz)hLUJm]Sd"p稛GЄ WWR@9̐D-Flk?P{ˢ
eo~;ހ]5 ^n>hl(l*.%QSh0R)h׃;{jJtt?Ē\$*'Fne@
?jDmXil*
r-xyȾ|f:UZ]QCI7ƉZ4%a:Z=ġ%,~] hxyt_*J4nɑN&
0Q99sҥ]!r>_qiHVE\x흸H9'G(N(ЖiIpvZҘ[6JJ̔V
G'y8
_MOTٞy|@v.[Кr U3йEɖUKV4c ?pMF
zoFVj;' <.S4}'7ZP@AUxfD
*5^Զ>*2PdVmf-˦
te%*0oJWLO}*
^4\Mu073':E킆'UW7SCͫp0~&GJP!ᭊu7O|} Z8&RoÌDf1Ԡ].]V~kF~|l3gxZ`]qkfucڻ}e45ar3PQ[襚dH"UtWAZ
5;˃?,ڰ-R8Qؒ40Me"ZMWUѼ2/ q{@3,"k[Y2Ln_b`l{en
7AfNI+v. %/f'(#܆!/O"%Q
٢8405y~,o5 lA^tCI:{)|\w9q(CƩi>O!DޚѪpBr f(ACC476dlo<%&ͽ
B^G@0A7eH\
ʋCMږ<{s0ضKim:}2/~q,Hv"xwį>^QC]Q!0OjKZ%'eIDRVWeB[Cnć$ dxr{A8!q1\S#3N`ah0J"2&jΗvo-A
/a/BwGIFԮ$T%
iY ~;'Ewx-1d8Pr
&h
։$vf l'PUS3x$3' mZ??*a
zЗ '5|5pmh9do qD}:fݓ{aTӧ~foɌɽ
W
Q\/ m1z+=sT7ᘄߏb1X{]yG