@INPROCEEDINGS{
TITLE="Computational security subject to source constraints, guesswork and inscrutability",
AUTHOR="A. Beirami, R. Calderbank, K. Duffy and M. Medard",
YEAR="2015",
BOOKTITLE="IEEE International Symposium on Information Theory",
PAGES=""
}