Dear Readers,

It is March, the month in which Cipher always extols the virtues of the IEEE Symposium on Security and Privacy. We have the program with the 29 accepted papers, a mixture of short and long expositions, and it represents the great research that we expect from the event. The quality comes from the hard work and dedication of the volunteers who serve the community each year, and they deserve our thanks.

We also have a book review from Richard Austin, who is becoming a Cipher regular with his readings in security literature. Jim Fenton brings us news from the IETF, where a new tool in the fight for secure email is emerging in the form of Domain Keys Identified Email.

This year's Security and Privacy Symposium caused several of us to carefully consider the policy concerning papers submitted to more than one conference review committee. Generally committees require exclusive review rights to the papers during their deliberations. Several complaints about authors who violate this restriction by submitting their paper to several committees simultaneously have surfaced during the last few years, and various proposals for policing submissions have been proposed. Authors want to have their papers published and reviewers don't want to waste their time on the same papers over and over. There is, as yet, no consensus on what to do, and the Cipher website will soon carry an editorial on the subject from someone who has served on several recent committees. Watch for it. This may also be a topic for discussion during the Security and Privacy Symposium.

For the time being, keep your firewall dry and don't fire until you see their buffers overflow.

Hilarie Orman
Cipher Editor