Multi-user Security of the Sum of Truncated Random Permutations.
Wonseok ChoiHwigyeom KimJooyoung LeeYeongmin LeePublished in: ASIACRYPT (2) (2022)
Keyphrases
- multi user
- virtual environment
- multi granularity
- augmented reality
- chosen plaintext
- user interface
- virtual world
- security issues
- information security
- multiple users
- security requirements
- multi touch
- access control
- network security
- multiple access
- single user
- security policies
- statistical databases
- security mechanisms
- intrusion detection
- security protocols
- probability distribution
- computer vision
- virtual reality
- virtual space
- security level
- objective function
- image processing