7 Acknowledgements
The first author acknowledges Canada's National Sciences and Engineering
Research Council (NSERC) for funding her PGS A scholarship. The
second author acknowledges
NSERC for funding an NSERC Discovery Grant and his
Canada Research Chair in Network and Software Security.