Coding Theorems for a $(2,2)$-Threshold Scheme With Detectability of Impersonation Attacks

IEEE Transactions on Information Theory - United States
doi 10.1109/tit.2012.2204546
Full Text
Abstract

Available in full text

Date
Authors
Publisher

Institute of Electrical and Electronics Engineers (IEEE)


Related search