Authentication Against a Myopic Adversary | IEEE Conference Publication | IEEE Xplore