@dblp

Quantifying computational security subject to source constraints, guesswork and inscrutability.

, , , and . ISIT, page 2757-2761. IEEE, (2015)

Links and resources

Tags