Hamming Distortion Based Secrecy Systems: To Foil the Eavesdropper With Finite Shared Key | IEEE Journals & Magazine | IEEE Xplore