Skip to main navigation
Skip to search
Skip to main content
Sort by
Keyphrases
Additively Homomorphic Encryption
10%
Big Data
16%
Cloud Computing
29%
Cloud Environment
21%
Cloud Service Provider
17%
Confidentiality
19%
Data Management
14%
Data Owner
20%
Data Recovery
16%
Data Sharing Framework
13%
Deep Neural Network
16%
Digital Forensics
16%
Document Detection
16%
Earth Sciences
20%
Encrypted Data
20%
Encrypted Database
12%
Environmental Science
20%
Fake News Detection
16%
Friend Recommendation
41%
Homomorphic Encryption
19%
Interactive Simulation
12%
Jaccard Coefficient
16%
K-nearest
22%
Network Service Provider
10%
Online Social Networks
38%
Outsourced Computation
10%
Outsourced Data
12%
Outsourced Environment
10%
Power Usage
16%
Privacy Awareness
28%
Privacy Concerns
17%
Privacy-preserving
63%
Privileged Access
10%
Query Processing
28%
Range Query
13%
Relational Data
10%
Search on Encrypted Data
25%
Secure Computation
12%
Secure Data Aggregation
14%
Secure Data Sharing
16%
Semantically Secure
24%
Shortest Path Search
16%
Similar Documents
20%
Smart Grid
12%
Software Metrics
13%
Software Vulnerability
13%
STEM Education
12%
Threshold Method
13%
Usage Control
16%
Wireless Sensor Networks
24%
Computer Science
Access Privilege
10%
Artificial Intelligence
9%
Attackers
8%
Big Data
18%
Bloom Filter
8%
Cardinality
8%
Cloud Computing
34%
Cloud Environment
21%
Cloud Platform
8%
cloud provider
9%
Cloud Service Provider
13%
Communication Cost
9%
Computer Simulation
16%
Data Aggregation
17%
Data Management
15%
Data Mining
8%
Data Recovery
16%
Data Sharing
16%
Deep Neural Network
16%
Design Simulation
8%
Digital Forensics
16%
Encrypted Data
43%
Encrypted Database
11%
Encrypted Value
8%
Encryption Scheme
30%
Experimental Result
24%
Friendly Interface
8%
Geospatial Data
10%
Homomorphic Encryption
31%
Jaccard Coefficient
16%
Location-Based Service
8%
Needed Information
8%
Network Provider
10%
Online Social Networks
45%
Outsourced Data
14%
Privacy Concern
13%
Privacy Preserving
100%
public key
8%
Query Processing
29%
Range Query
10%
Relational Data
10%
secure multiparty computation
13%
Smart Grid
20%
Social Network
9%
Social Network Structure
12%
Software Metric
11%
Software Vulnerability
11%
Utility Company
12%
Vector Space Models
8%
Wireless Sensor Network
24%