Login / Signup

Keyless authentication in the presence of a simultaneously transmitting adversary.

Eric GravesPaul L. YuPredrag Spasojevic
Published in: ITW (2016)
Keyphrases
  • data sets
  • information systems
  • identity authentication
  • databases
  • genetic algorithm
  • artificial intelligence
  • wireless networks
  • biometric authentication
  • identity management