Computer Science
deduplication
100%
Cloud Storage
96%
Authentication
82%
Encrypted Data
62%
side-channel
58%
Attribute-Based Encryption
58%
Ciphertext
56%
group key
52%
Data Deduplication
51%
Outsourced Data
49%
Privacy Preserving
46%
Key Distribution
46%
group key management
41%
Neural Network
40%
Key Management Scheme
40%
Data Integrity
40%
Wireless Sensor Network
37%
Public Key Encryption
37%
Keyword Search
37%
authentication scheme
37%
secure group communication
36%
secure multicast
35%
Group Communication
31%
Attackers
30%
Encryption Scheme
30%
Searchable Encryption Scheme
29%
Information Leakage
28%
Deep Learning
28%
Computation Cost
27%
Multimedia Data
27%
Cloud Computing
27%
Performance Analysis
26%
Authentication Protocol
25%
Mobile Device
25%
Internet of Things
25%
Comparative Analysis
25%
public key
25%
Key Management
25%
User Revocation
25%
Bitcoin
25%
multi-hop network
25%
IEEE 802.11
25%
Handoff
25%
Attack Model
25%
Unauthorized User
25%
Mail User Agent
25%
Dark Web
25%
Decryption
24%
Password
22%
security level
21%
Keyphrases
Secure Deduplication
25%
Dynamic Searchable Symmetric Encryption
25%
Backward Privacy
25%
Data Dynamics
25%
Authentication Scheme
25%
Software Guard Extensions
25%
Ciphertext-policy Attribute-based Encryption (CP-ABE)
23%
Privacy-preserving Biometrics
18%
Attribute Revocation
18%
Performance Analysis
16%
Group Key
16%
Proxy Encryption
15%
Outsourced Data
15%
Data Outsourcing
15%
Cache Side Channel
15%
Data Access Control
14%
Fine-grained Access
14%
User Revocation
14%
Cross-database Query
12%
Data Sharing Policy
12%
Hybrid Convolutional Neural Network
12%
Distributed Sensor Network
12%
Privacy-preserving Data Aggregation
12%
Small Distortion
12%
Encrypted Deduplication
12%
Serverless Computing
12%
Multi-key
12%
Encrypted Storage
12%
Page Cache
12%
FlightGear
12%
Public Cloud Storage
12%
Downgrade Attacks
12%
Public Auditing
12%
Biometric Identification
12%
Secure Group Communication
12%
Self-healing Key Distribution
12%
Verifiable Aggregation
12%
Cross-silo Federated Learning
12%
Secure Simple Pairing
12%
Blocking Attacks
12%
Mobile AP
12%
Man-in-the-middle Attack
12%
Medical Cyber-physical Systems
12%
Key Trace
12%
Online Authentication
12%
Transport Layer Security
12%
Data-oriented
12%
Host Image
12%
Fc-means Clustering
12%
Secure Data Deduplication
12%