Multi-User Security of the Sum of Truncated Random Permutations (Full Version).
Wonseok ChoiHwigyeom KimJooyoung LeeYeongmin LeePublished in: IACR Cryptol. ePrint Arch. (2022)
Keyphrases
- multi user
- virtual environment
- multi granularity
- augmented reality
- multi touch
- virtual world
- user interface
- multiple users
- information security
- security policies
- single user
- intrusion detection
- access control
- network security
- security requirements
- chosen plaintext
- security issues
- security analysis
- statistical databases
- human computer interaction
- multiple access
- objective function
- security mechanisms
- dynamic integration
- probability distribution