Secret key-based authentication with a privacy constraint
Secret key-based authentication with a privacy constraint
Kittichokechai, Kittipong;Caire, Giuseppe
2015-06-01 00:00:00
http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png2015 IEEE International Symposium on Information Theory (ISIT)Unpaywallhttp://www.deepdyve.com/lp/unpaywall/secret-key-based-authentication-with-a-privacy-constraint-1kAgvmCUrR
Secret key-based authentication with a privacy constraint
To get new article updates from a journal on your personalized homepage, please log in first, or sign up for a DeepDyve account if you don’t already have one.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.