Login / Signup
Multiuser authentication with anonymity constraints over noisy channels.
Remi A. Chou
Aylin Yener
Published in:
ISIT (2016)
Keyphrases
</>
constraint satisfaction
multi channel
linear constraints
ring signature scheme
noisy data
constrained optimization
communication channels
noisy environments
security analysis
authentication scheme
biometric authentication
trusted third party