Login / Signup
Perfect Secrecy Systems Immune to Spoofing Attacks
Michael Huber
Published in:
CoRR (2012)
Keyphrases
</>
distributed systems
intelligent systems
complex systems
biometric systems
information systems
management system
computer systems
malicious users