This is the supplementary material for the article in the title, submitted to the Journal of Information Security and Applications.