Similar Items: Partial integrity, authenticity and belongingness using modification-tolerant signature schemes
- SD2PA: a fully safe driving and privacy-preserving authentication scheme for VANETs
- Hybrid Anomaly Detection for Bullion Coin Authentication Leveraging Acoustic Signature Analysis
- Presentable signatures and initial semantics
- Stochastic Modeling of Human-Machine Authentication Channels under Partial Information Leakage
- Using models to model-check recursive schemes
- Partial functions and domination