Abstract
We consider problems where n people are communicating and a random subset of them is trying to leak information, without making it clear who are leaki......
小提示:本篇文献需要登录阅读全文,点击跳转登录