Keyless authentication in the presence of a simultaneously transmitting adversary | IEEE Conference Publication | IEEE Xplore