Revisiting the Security of DbHtS MACs: Beyond-Birthday-Bound in the Multi-User Setting.
Yaobin ShenLei WangJian WengPublished in: IACR Cryptol. ePrint Arch. (2020)
Keyphrases
- multi user
- virtual environment
- virtual world
- multi granularity
- augmented reality
- multiple users
- upper bound
- lower bound
- single user
- information security
- access control
- security policies
- security issues
- security requirements
- intrusion detection
- worst case
- user interface
- network security
- collaborative writing
- computer vision
- statistical databases
- multi touch
- error bounds
- virtual space
- multiple access