Login / Signup

Structured Coding for Authentication in the Presence of a Malicious Adversary.

Allison BeemerOliver KosutJörg KliewerEric GravesPaul L. Yu
Published in: ISIT (2019)
Keyphrases