Signatures with Tight Multi-user Security from Search Assumptions.
Jiaxin PanMagnus RingerudPublished in: ESORICS (2) (2020)
Keyphrases
- multi user
- virtual environment
- search algorithm
- virtual world
- multi granularity
- augmented reality
- search space
- multiple users
- single user
- network security
- risk assessment
- lower bound
- multiple access
- multi touch
- search strategy
- intrusion detection
- user interface
- web search
- statistical databases
- security requirements
- security policies
- malware detection
- collaborative writing
- upper bound