On signatures with tight security in the multi-user setting.
Goichiro HanaokaJacob C. N. SchuldtPublished in: ISITA (2016)
Keyphrases
- multi user
- virtual environment
- user interface
- multi granularity
- augmented reality
- virtual world
- upper bound
- access control
- security requirements
- information security
- security issues
- lower bound
- single user
- multiple users
- statistical databases
- intrusion detection
- multi touch
- smart objects
- computer security
- worst case
- network security
- security mechanisms
- key management
- security analysis
- signature verification
- digital signature
- multiple access