Computer Science
Anonymous Authentication
57%
Attribute-Based Encryption
57%
Authentication Protocol
47%
Back End
28%
Boolean Search
28%
Cellular Network
28%
Ciphertext
40%
Client Privilege
14%
Cloud Computing
51%
Cloud Storage
35%
Collected Data
14%
Communication Cost
28%
Computational Cost
28%
Conjunctive Query
28%
Constrained Set
28%
Cryptographic Primitive
14%
Cryptographic Technique
14%
Decryption
65%
Encrypted Data
34%
Encrypted Database
66%
Encryption Scheme
40%
Enhanced Security
28%
Fog Computing
28%
Grained Access Control
14%
group signature
17%
Hash Function
28%
Health Information
14%
Keyword Search
31%
Medical Record
14%
Multiple Client
14%
Privacy Concern
14%
Privacy Preserving
52%
Protecting Privacy
14%
proxy re encryption
28%
public-key encryption
28%
random oracle model
14%
Range Query
57%
Searchable Symmetric Encryption Scheme
97%
Security Analysis
32%
Sensor Networks
14%
Signature Scheme
45%
Symmetric Encryption
100%
Symmetric Encryption Algorithm
14%
Traditional Application
14%
Unauthorized Access
14%
Urban Environment
14%
User Privacy
15%
vehicular ad-hoc network
57%
Verification Process
14%
Wireless Networks
14%