Revisiting the Security of DbHtS MACs: Beyond-Birthday-Bound in the Multi-user Setting.
Yaobin ShenLei WangDawu GuJian WengPublished in: CRYPTO (3) (2021)
Keyphrases
- multi user
- virtual environment
- virtual world
- augmented reality
- multi granularity
- multi touch
- user interface
- information security
- upper bound
- multiple users
- single user
- multiple access
- security issues
- intrusion detection
- access control
- network security
- lower bound
- statistical databases
- security requirements
- smart objects
- security level
- security mechanisms
- worst case
- collaborative writing
- security policies
- computer graphics