Inproceedings,

Quantifying computational security subject to source constraints, guesswork and inscrutability.

, , , and .
ISIT, page 2757-2761. IEEE, (2015)

Meta data

Tags

Users

  • @dblp

Comments and Reviews