Active adversaries from an information-theoretic perspective: Data modification attacks | IEEE Conference Publication | IEEE Xplore