How to Identify and Authenticate Users in Massive Unsourced Random Access | IEEE Journals & Magazine | IEEE Xplore