Login / Signup
Keyless authentication in the presence of a simultaneously transmitting adversary.
Eric Graves
Paul L. Yu
Predrag Spasojevic
Published in:
ITW (2016)
Keyphrases
</>
data sets
information systems
identity authentication
databases
genetic algorithm
artificial intelligence
wireless networks
biometric authentication
identity management