Structured Coding for Authentication in the Presence of a Malicious Adversary | IEEE Conference Publication | IEEE Xplore