Secure Identification Under Passive Eavesdroppers and Active Jamming Attacks | IEEE Journals & Magazine | IEEE Xplore