Coding Theorems for a --Threshold Scheme With Detectability of Impersonation Attacks | IEEE Journals & Magazine | IEEE Xplore