Keyphrases
Additively Homomorphic Encryption
11%
Big Data
17%
Cloud Computing
31%
Cloud Environment
23%
Cloud Service Provider
18%
Confidentiality
21%
Data Management
15%
Data Owner
22%
Data Query
11%
Data Recovery
17%
Data Sharing Framework
14%
Deep Neural Network
17%
Digital Forensics
17%
Document Detection
17%
Earth Sciences
22%
Encrypted Data
22%
Encrypted Database
13%
Environmental Science
22%
Friend Recommendation
44%
Homomorphic Encryption
20%
Interactive Simulation
13%
Jaccard Coefficient
17%
K-nearest
24%
Need to Know
10%
Online Social Networks
35%
Outsourced Computation
11%
Outsourced Data
13%
Power Usage
17%
Privacy Awareness
22%
Privacy Concerns
19%
Privacy-preserving
65%
Privileged Access
11%
Processing Framework
11%
Query Processing
30%
Range Query
13%
Relational Data
11%
Search on Encrypted Data
27%
Secure Computation
13%
Secure Data Aggregation
15%
Secure Data Sharing
17%
Secure Framework
10%
Semantically Secure
26%
Shortest Path Search
17%
Similar Documents
22%
Smart Grid
13%
Software Vulnerability
10%
STEM Education
13%
Threshold Method
14%
Usage Control
17%
Wireless Sensor Networks
26%
Computer Science
Access Privilege
11%
Artificial Intelligence
10%
Attackers
9%
Big Data
19%
Bloom Filter
8%
Cardinality
8%
Cloud Computing
37%
Cloud Environment
22%
Cloud Platform
8%
cloud provider
10%
Cloud Service Provider
14%
Communication Cost
10%
Computer Simulation
17%
Data Aggregation
18%
Data Management
16%
Data Mining
9%
Data Recovery
17%
Data Sharing
17%
Deep Neural Network
17%
Design Simulation
8%
Digital Forensics
17%
Encrypted Data
47%
Encrypted Database
12%
Encrypted Value
8%
Encryption Scheme
32%
Experimental Result
23%
Friendly Interface
8%
Geospatial Data
11%
Homomorphic Encryption
33%
Jaccard Coefficient
17%
Location-Based Service
8%
Needed Information
8%
Online Social Networks
35%
Outsourced Data
15%
Privacy Concern
13%
Privacy Preserving
100%
public key
8%
Query Processing
31%
Range Query
11%
Relational Data
11%
secure multiparty computation
13%
Smart Grid
22%
Social Network
10%
Social Network Structure
8%
Software Metric
12%
Software Vulnerability
12%
Utility Company
13%
Vector Space Models
8%
Web-Based System
8%
Wireless Sensor Network
26%