Keyphrases
Homomorphic Encryption
84%
Proxy Re-encryption
56%
Encrypted Computing
41%
Homomorphic Cryptography
41%
Lattice-based
37%
Obfuscator
27%
Pollution Attack
26%
Computer Security
25%
Obfuscation
23%
Medical Data
23%
Private Information Retrieval
23%
Version Control System
22%
Point Function
21%
Mobile Application
21%
Gaussian Sample
20%
Attack Defense
20%
Face Recognition
20%
Mobile Cloud Computing
20%
Trapdoor
20%
Physical-layer Network Coding
20%
Practical Implementation
20%
Data Access
20%
Medical Information
20%
Browser
19%
Encryption
18%
Ciphertext-policy Attribute-based Encryption (CP-ABE)
17%
Code Obfuscation
17%
Popular
17%
Ring-LWE
17%
Functional Encryption
17%
Publish-subscribe
17%
Attack Strategy
15%
Security Model
15%
Decryption Key
14%
Fully Homomorphic Encryption
14%
Coding System
14%
Attacker
14%
Medical Data Storage
13%
Anonymization
13%
Vulnerability
13%
Attribute-based Encryption Scheme
13%
Decrypt
12%
Bootstrap
12%
Searchable Encryption
12%
Applied Cryptography
12%
Secure Function Evaluation
12%
Security Cryptography
12%
Academia-industry Collaboration
12%
Communication Security
12%
Lattice-based Cryptography
12%
Network Coding
12%
Fully Homomorphic Encryption Scheme
12%
Delegation Model
11%
Homomorphic Encryption Scheme
11%
Confidentiality
11%
Parameter Selection
11%
Designated Recipient
11%
Encrypted Data
10%
Lattice Trapdoors
10%
Rampart
10%
Traffic Restriction
10%
Secure Proxy
10%
Parking Restrictions
10%
Teleconferencing
10%
Linear Secret Sharing
10%
Cache Side-channel Attacks
10%
Software Certification
10%
Data Exfiltration
10%
Chinese Remaindering
10%
Resilient Security
10%
Entropy Attack
10%
Crowdsensing
10%
ParticipACTION
10%
Binary Fingerprints
10%
Compressed Storage
10%
Sequence Search
10%
Farm-to-table
10%
Access Delegation
10%
Wearable Medical Devices
10%
Overlay File Systems
10%
Publish-subscribe Systems
10%
Responsible Disclosure
10%
Manipulation Attack
10%
Developer Actions
10%
Patch Merging
10%
Leave No Trace
10%
Shared History
10%
Metadata Manipulation
10%
Security Architecture
10%
Device Data
10%
End-to-end Security
10%
Voice over Internet Protocol (VoIP)
10%
Local Intrinsic Dimensionality
10%
Toto
10%
Backward Compatible
10%
Remote Data Integrity Checking
10%
Social Networks
10%
Wireless
10%
Encryption Applications
10%
Secure multi-party Computation
10%
Computer Science
Homomorphic Encryption
100%
Encryption Scheme
55%
proxy re encryption
49%
Obfuscation
40%
Computer Security
37%
Attackers
30%
Network Coding
30%
Information Retrieval
29%
Fully Homomorphic Encryption
28%
Encrypted Data
26%
Version Control System
23%
Experimental Result
23%
Use Case
23%
Decryption
22%
Function Point
21%
Face Recognition
20%
Mobile Cloud Computing
20%
Attribute-Based Encryption
20%
Wireless Networks
20%
Privacy Preserving
20%
Data Access
20%
Medical Information
20%
Side Channel
20%
Applied Computing
20%
Communication Security
18%
Function Evaluation
18%
Security Model
15%
Ciphertext
15%
Information Storage
13%
Digital Signature
12%
Sampling Algorithm
12%
Mobile Application
12%
Attack Surface
12%
Browser Extension
12%
Healthcare Data
11%
Android
11%
Mobile Device
10%
Learning with Errors
10%
Teleconferencing
10%
identity based encryption
10%
Intrinsic Dimensionality
10%
Secret Sharing
10%
Data Exfiltration
10%
Supply Chain
10%
Certification Service
10%
Space Requirement
10%
secure multiparty computation
10%
Advanced Encryption Standard
10%
Multiple Operating System
10%
Electronic Frontier
10%
Tor Browser
10%
Public Identifier
10%
Side Channel Attack
10%
Cryptographic Primitive
10%
Distribution Information
10%
Floating Point
10%
Attack Resource
10%
Route Planning
10%
Subscribe System
10%
Security Architecture
10%
Digital Signature Scheme
10%
Software Vulnerability
10%
Responsible Disclosure
10%
Installing Software
10%
Data Integrity
10%
Integrity Checking
10%
Security and Privacy
10%
Data Privacy
10%
Negative Consequence
10%
Facebook
10%
Data Storage Device
10%
Coprocessor
10%
Smart City
10%
Instagram
10%
Data Sharing
10%
Multimedia
10%
Centralized Version
10%
Microarchitecture
10%
Firefox
10%
Filesystems
10%
Browsing History
10%
Sniffing
10%
Mobile App
8%
Authorized User
8%
Data Encryption
8%
Information Architecture
8%
Cloud Computing
8%
Information System
8%
Security Challenge
8%
Black-Box Attack
7%
Systems Performance
7%
Security Concern
7%
Software Library
7%
Social Network
6%
Internet of Things
6%
Distributed Computing
6%
Network Traffic
6%
Sniffing Attack
6%
public key
6%
Computer Network
5%