On the choice of the defence strategy for an authentication code with two-state source (Q3225896): Difference between revisions
From MaRDI portal
Created claim: Wikidata QID (P12): Q110512185, #quickstatements; #temporary_batch_1708039819900 |
ReferenceBot (talk | contribs) Changed an Item |
||
(2 intermediate revisions by 2 users not shown) | |||
Property / MaRDI profile type | |||
Property / MaRDI profile type: MaRDI publication profile / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: On the game-theoretical approach to the analysis of authentication codes / rank | |||
Normal rank | |||
links / mardi / name | links / mardi / name | ||
Latest revision as of 00:17, 5 July 2024
scientific article
Language | Label | Description | Also known as |
---|---|---|---|
English | On the choice of the defence strategy for an authentication code with two-state source |
scientific article |
Statements
On the choice of the defence strategy for an authentication code with two-state source (English)
0 references
23 March 2012
0 references