CORE
🇺🇦Â
 make metadata, not war
Services
Services overview
Explore all CORE services
Access to raw data
API
Dataset
FastSync
Content discovery
Recommender
Discovery
OAI identifiers
OAI Resolver
Managing content
Dashboard
Bespoke contracts
Consultancy services
Support us
Support us
Membership
Sponsorship
Community governance
Advisory Board
Board of supporters
Research network
About
About us
Our mission
Team
Blog
FAQs
Contact us
Filters
1 research outputs found
NO-LEAK AUTHENTICATION BY THE SHERLOCK HOLMES METHOD
Author
Dima Grigoriev
Vladimir Shpilrain
Publication venue
Publication date
01/01/2012
Field of study
Get PDF
“When you have eliminated the impossible, whatever remains, however improbable, must be the truth.
CiteSeerX
Crossref
MPG.PuRe
Cryptology ePrint Archive