[1]
D. Monschein and O. Waldhorst, “Privacy-Preserving and Scalable Authentication based on Network Connection Traces”, eceasst, vol. 80, Sep. 2021.