; --------------------------------------------------------------------- ; Submit by logging into grace.umd.edu and using the following command: ; submit 2014 fall enee 757 0101 10 my_file.bib ; --------------------------------------------------------------------- ; Required Readings @INPROCEEDINGS{ Heninger12, title = {Mining Your {P}s and {Q}s: {D}etection of Widespread Weak Keys in Network Devices}, author = {Nadia Heninger and Zakir Durumeric and Eric Wustrow and J. Alex Halderman}, booktitle = {Proceedings of the 21st {USENIX} Security Symposium}, month = {August}, year = {2012}, studentfirstname ="", studentlastname ="", summary = "", contribution1 ="", contribution2 ="", contribution3 ="", contribution4 ="", contribution5 ="", weakness1 = "", weakness2 = "", weakness3 = "", weakness4 = "", weakness5 = "", interesting = "high/med/low", opinions = "", } ; BibTex cross-references (don't add anything here)