Coding Theorems for a $(2,2)$-Threshold Scheme With Detectability of Impersonation Attacks
IEEE Transactions on Information Theory - United States
doi 10.1109/tit.2012.2204546
Full Text
Open PDFAbstract
Available in full text
Date
September 1, 2012
Authors
Publisher
Institute of Electrical and Electronics Engineers (IEEE)