Computer Science
deduplication
100%
Cloud Storage
87%
Authentication
69%
Privacy Preserving
68%
Attribute-Based Encryption
62%
Encrypted Data
51%
side-channel
50%
Ciphertext
45%
Attackers
42%
Information Leakage
41%
Data Deduplication
37%
Outsourced Data
36%
Key Distribution
31%
group key
31%
Encryption Scheme
28%
group key management
27%
Searchable Encryption Scheme
27%
Key Management Scheme
26%
authentication scheme
25%
Wireless Sensor Network
25%
Cloud Computing
24%
Security Analysis
24%
Password
23%
Access Control
23%
Decryption
22%
Authentication Protocol
22%
Key Management
21%
Performance Analysis
21%
Data Integrity
20%
Data Sharing
20%
Neural Network
20%
Cloud Storage Service
20%
Deep Learning Method
20%
Internet-Of-Things
20%
User Revocation
20%
Mobile Device
19%
Computation Cost
19%
Transport Layer Security
19%
Public Key Encryption
18%
Keyword Search
18%
Handoff
18%
Fog Computing
18%
Wireless Mesh Network
18%
Smart Grid
18%
secure multicast
17%
secure group communication
16%
security level
15%
Monitoring System
15%
Comparative Analysis
15%
Data Privacy
14%
Keyphrases
Cloud Storage
81%
Deduplication
59%
Privacy-preserving
47%
Secure Deduplication
45%
Ciphertext-policy Attribute-based Encryption (CP-ABE)
36%
Attribute-based Encryption
36%
Outsourced Data
36%
Encrypted Data
36%
Information Leakage
31%
Vulnerability
29%
Cache Side-channel Attacks
28%
Key Management Scheme
27%
Group Key Management
27%
Searchable Encryption Scheme
26%
Data Owner
25%
Data Outsourcing
25%
Ownership Management
25%
Cloud Storage Service
24%
Privacy Concerns
23%
Security Analysis
23%
Side-channel Attacks
23%
Data Deduplication
22%
Performance Analysis
22%
Neural Network
22%
Group Key
22%
Searchable Encryption
21%
Cloud Server
21%
Authentication Scheme
20%
Secure Data Deduplication
20%
Wireless Sensor Networks
20%
Data Integrity
20%
Encryption Scheme
19%
User Revocation
19%
Group Communication
19%
Attacker
18%
Adversary
18%
Encryption
18%
Attribute-based
18%
Smart Grid
18%
Wireless Mesh Networks
18%
Fog Computing
18%
Public Auditing
18%
Backward Privacy
18%
Dynamic Searchable Symmetric Encryption
18%
Public Key Encryption with Keyword Search
18%
Mobile Devices
18%
Secure Group Communication
18%
Data Privacy
18%
Convergent Encryption
17%
Broadcast Encryption
17%