Keyphrases
Access Delegation
11%
Anonymization
15%
Attack Defense
22%
Attack Strategy
17%
Attacker
15%
Attribute-based Encryption Scheme
14%
Backward Compatible
11%
Binary Fingerprints
11%
Bootstrap
14%
Browser
17%
Cache Side-channel Attacks
11%
Chinese Remaindering
11%
Ciphertext-policy Attribute-based Encryption (CP-ABE)
20%
Code Obfuscation
20%
Coding System
16%
Compressed Storage
11%
Computer Security
13%
Confidentiality
12%
Crowdsensing
11%
Data Access
22%
Data Exfiltration
11%
Data Privacy
11%
Decrypt
14%
Decryption Key
16%
Delegation Model
13%
Designated Recipient
12%
Developer Actions
11%
Device Data
11%
Encrypted Computing
22%
Encrypted Data
12%
Encryption
20%
Encryption Applications
11%
End-to-end Security
11%
Entropy Attack
11%
Face Recognition
22%
Farm-to-table
11%
Fully Homomorphic Encryption
16%
Fully Homomorphic Encryption Scheme
13%
Functional Encryption
11%
Gaussian Sample
22%
Geosocial
11%
Homomorphic Cryptography
22%
Homomorphic Encryption
86%
Homomorphic Encryption Scheme
12%
Image Classification
11%
Key-policy
11%
Lattice Trapdoors
11%
Lattice-based
41%
Lattice-based Cryptography
14%
Leave No Trace
11%
Linear Secret Sharing
11%
Local Intrinsic Dimensionality
11%
Manipulation Attack
11%
Medical Data
25%
Medical Data Storage
15%
Medical Information
22%
Metadata Manipulation
11%
Mobile Application
23%
Mobile Cloud Computing
22%
Network Coding
13%
Obfuscation
26%
Obfuscator
30%
Overlay File Systems
11%
Parameter Selection
12%
Parking Restrictions
11%
ParticipACTION
11%
Patch Merging
11%
Physical-layer Network Coding
22%
Point Function
24%
Pollution Attack
29%
Popular
15%
Practical Implementation
22%
Privacy-preserving
11%
Private Information Retrieval
18%
Proxy Re-encryption
62%
Publish-subscribe
19%
Publish-subscribe Systems
11%
Rampart
11%
Remote Data Integrity Checking
11%
Resilient Security
11%
Responsible Disclosure
11%
Ring-LWE
19%
Secure multi-party Computation
11%
Secure Proxy
11%
Security Architecture
11%
Security Model
16%
Sequence Search
11%
Shared History
11%
Side-channel Attacks
11%
Social Networks
11%
Software Certification
11%
Teleconferencing
11%
Toto
11%
Traffic Restriction
11%
Trapdoor
22%
Version Control System
24%
Voice over Internet Protocol (VoIP)
11%
Vulnerability
15%
Wearable Medical Devices
11%
Wireless
11%
Computer Science
Advanced Encryption Standard
11%
Android
13%
Applied Computing
11%
Attack Resource
11%
Attack Surface
14%
Attackers
34%
Attribute-Based Encryption
22%
Authorized User
9%
Black-Box Attack
8%
Browser Extension
14%
Centralized Version
11%
Certification Service
11%
Ciphertext
16%
Cloud Computing
9%
Communication Cost
6%
Communication Security
9%
Computer Network
6%
Computer Security
19%
Coprocessor
11%
Cryptographic Primitive
11%
Data Access
22%
Data Encryption
9%
Data Exfiltration
11%
Data Integrity
11%
Data Privacy
11%
Data Sharing
11%
Data Storage Device
11%
Decryption
25%
Digital Signature
14%
Digital Signature Scheme
11%
Distributed Computing
7%
Distribution Information
11%
Electronic Frontier
11%
Encrypted Data
29%
Encryption Scheme
61%
Experimental Result
26%
Face Recognition
22%
Facebook
11%
Filesystems
11%
Firefox
11%
Floating Point
11%
Fully Homomorphic Encryption
31%
Function Evaluation
9%
Function Point
24%
Healthcare Data
13%
Homomorphic Encryption
100%
identity based encryption
11%
Information Architecture
9%
Information Hiding
5%
Information Retrieval
20%
Information Storage
15%
Information System
9%
Instagram
11%
Installing Software
11%
Integrity Checking
11%
Internet of Things
7%
Intrinsic Dimensionality
11%
Learning with Errors
11%
Medical Information
22%
Microarchitecture
11%
Mobile App
9%
Mobile Application
14%
Mobile Cloud Computing
22%
Mobile Device
12%
Multimedia
11%
Multiple Operating System
11%
Negative Consequence
11%
Network Coding
34%
Network Traffic
7%
Obfuscation
45%
Privacy Preserving
22%
provably secure
6%
proxy re encryption
55%
Public Identifier
11%
public key
6%
Responsible Disclosure
11%
Route Planning
11%
Sampling Algorithm
14%
Secret Sharing
11%
secure multiparty computation
11%
Security and Privacy
11%
Security Architecture
11%
Security Challenge
9%
Security Concern
8%
Security Model
17%
Side Channel
11%
Side Channel Attack
11%
Smart City
11%
Social Network
7%
Software Library
7%
Software Vulnerability
11%
Space Requirement
11%
Subscribe System
11%
Supply Chain
11%
Systems Performance
8%
Teleconferencing
11%
Tor Browser
11%
Use Case
26%
Version Control System
26%
Wireless Networks
22%