Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 7-Day Trial for You or Your Team.

Learn More →

Secret key-based authentication with a privacy constraint

Secret key-based authentication with a privacy constraint http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png 2015 IEEE International Symposium on Information Theory (ISIT) Unpaywall

Secret key-based authentication with a privacy constraint

2015 IEEE International Symposium on Information Theory (ISIT)Jun 1, 2015
Loading next page...
 
/lp/unpaywall/secret-key-based-authentication-with-a-privacy-constraint-1kAgvmCUrR

References

References for this paper are not available at this time. We will be adding them shortly, thank you for your patience.

Publisher
Unpaywall
DOI
10.1109/isit.2015.7282764
Publisher site
See Article on Publisher Site

Abstract

Journal

2015 IEEE International Symposium on Information Theory (ISIT)Unpaywall

Published: Jun 1, 2015

There are no references for this article.