Security and privacy in emerging networks: Part II [Guest Editorial]