Information-theoretic bounds in authentication theory | IEEE Conference Publication | IEEE Xplore