Wiretap-channels under constrained active and passive attacks | IEEE Conference Publication | IEEE Xplore