Keyphrases
Homomorphic Encryption
86%
Proxy Re-encryption
62%
Lattice-based
41%
Obfuscator
30%
Pollution Attack
29%
Obfuscation
26%
Medical Data
25%
Version Control System
24%
Point Function
24%
Mobile Application
23%
Gaussian Sample
22%
Attack Defense
22%
Encrypted Computing
22%
Face Recognition
22%
Mobile Cloud Computing
22%
Trapdoor
22%
Physical-layer Network Coding
22%
Practical Implementation
22%
Homomorphic Cryptography
22%
Data Access
22%
Medical Information
22%
Encryption
20%
Ciphertext-policy Attribute-based Encryption (CP-ABE)
20%
Code Obfuscation
20%
Ring-LWE
19%
Publish-subscribe
19%
Private Information Retrieval
18%
Attack Strategy
17%
Browser
17%
Security Model
16%
Decryption Key
16%
Fully Homomorphic Encryption
16%
Coding System
16%
Attacker
15%
Medical Data Storage
15%
Popular
15%
Anonymization
15%
Vulnerability
15%
Attribute-based Encryption Scheme
14%
Decrypt
14%
Bootstrap
14%
Lattice-based Cryptography
14%
Network Coding
13%
Fully Homomorphic Encryption Scheme
13%
Delegation Model
13%
Computer Security
13%
Homomorphic Encryption Scheme
12%
Confidentiality
12%
Parameter Selection
12%
Designated Recipient
12%
Encrypted Data
12%
Functional Encryption
11%
Lattice Trapdoors
11%
Rampart
11%
Traffic Restriction
11%
Secure Proxy
11%
Parking Restrictions
11%
Teleconferencing
11%
Linear Secret Sharing
11%
Cache Side-channel Attacks
11%
Software Certification
11%
Data Exfiltration
11%
Chinese Remaindering
11%
Resilient Security
11%
Entropy Attack
11%
Crowdsensing
11%
ParticipACTION
11%
Binary Fingerprints
11%
Compressed Storage
11%
Sequence Search
11%
Farm-to-table
11%
Access Delegation
11%
Wearable Medical Devices
11%
Overlay File Systems
11%
Publish-subscribe Systems
11%
Responsible Disclosure
11%
Manipulation Attack
11%
Developer Actions
11%
Patch Merging
11%
Leave No Trace
11%
Shared History
11%
Metadata Manipulation
11%
Security Architecture
11%
Device Data
11%
End-to-end Security
11%
Voice over Internet Protocol (VoIP)
11%
Local Intrinsic Dimensionality
11%
Toto
11%
Backward Compatible
11%
Remote Data Integrity Checking
11%
Social Networks
11%
Wireless
11%
Encryption Applications
11%
Secure multi-party Computation
11%
Key-policy
11%
Image Classification
11%
Geosocial
11%
Data Privacy
11%
Side-channel Attacks
11%
Privacy-preserving
11%
Computer Science
Homomorphic Encryption
100%
Encryption Scheme
61%
proxy re encryption
55%
Obfuscation
45%
Attackers
34%
Network Coding
34%
Fully Homomorphic Encryption
31%
Encrypted Data
29%
Version Control System
26%
Experimental Result
26%
Use Case
26%
Decryption
25%
Function Point
24%
Face Recognition
22%
Mobile Cloud Computing
22%
Attribute-Based Encryption
22%
Wireless Networks
22%
Privacy Preserving
22%
Data Access
22%
Medical Information
22%
Information Retrieval
20%
Computer Security
19%
Security Model
17%
Ciphertext
16%
Information Storage
15%
Digital Signature
14%
Sampling Algorithm
14%
Mobile Application
14%
Attack Surface
14%
Browser Extension
14%
Healthcare Data
13%
Android
13%
Mobile Device
12%
Learning with Errors
11%
Teleconferencing
11%
identity based encryption
11%
Intrinsic Dimensionality
11%
Secret Sharing
11%
Data Exfiltration
11%
Supply Chain
11%
Certification Service
11%
Applied Computing
11%
Space Requirement
11%
secure multiparty computation
11%
Advanced Encryption Standard
11%
Multiple Operating System
11%
Electronic Frontier
11%
Side Channel
11%
Tor Browser
11%
Public Identifier
11%
Side Channel Attack
11%
Cryptographic Primitive
11%
Distribution Information
11%
Floating Point
11%
Attack Resource
11%
Route Planning
11%
Subscribe System
11%
Security Architecture
11%
Digital Signature Scheme
11%
Software Vulnerability
11%
Responsible Disclosure
11%
Installing Software
11%
Data Integrity
11%
Integrity Checking
11%
Security and Privacy
11%
Data Privacy
11%
Negative Consequence
11%
Facebook
11%
Data Storage Device
11%
Coprocessor
11%
Smart City
11%
Instagram
11%
Data Sharing
11%
Multimedia
11%
Centralized Version
11%
Microarchitecture
11%
Firefox
11%
Filesystems
11%
Mobile App
9%
Communication Security
9%
Function Evaluation
9%
Authorized User
9%
Data Encryption
9%
Information Architecture
9%
Cloud Computing
9%
Information System
9%
Security Challenge
9%
Black-Box Attack
8%
Systems Performance
8%
Security Concern
8%
Software Library
7%
Social Network
7%
Internet of Things
7%
Distributed Computing
7%
Network Traffic
7%
public key
6%
Communication Cost
6%
Computer Network
6%
provably secure
6%
Information Hiding
5%