On the choice of the defence strategy for an authentication code with two-state source (Q3225896): Difference between revisions
From MaRDI portal
Created a new Item |
ReferenceBot (talk | contribs) Changed an Item |
||
(3 intermediate revisions by 3 users not shown) | |||
Property / Wikidata QID | |||
Property / Wikidata QID: Q110512185 / rank | |||
Normal rank | |||
Property / MaRDI profile type | |||
Property / MaRDI profile type: MaRDI publication profile / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: On the game-theoretical approach to the analysis of authentication codes / rank | |||
Normal rank | |||
links / mardi / name | links / mardi / name | ||
Latest revision as of 00:17, 5 July 2024
scientific article
Language | Label | Description | Also known as |
---|---|---|---|
English | On the choice of the defence strategy for an authentication code with two-state source |
scientific article |
Statements
On the choice of the defence strategy for an authentication code with two-state source (English)
0 references
23 March 2012
0 references