|
anonymity |
5 |
|
oblivious transfer |
5 |
|
ring signature |
5 |
|
access policies |
4 |
|
data-base servers |
4 |
|
database records |
4 |
|
generic construction |
4 |
|
linkable |
4 |
|
ring signatures |
4 |
|
the standard model |
4 |
|
blockchain |
3 |
|
cp-abe |
3 |
|
k-taa |
3 |
|
privacy |
3 |
|
access control |
2 |
|
anonymous access |
2 |
|
anonymous authentication |
2 |
|
artificial intelligence |
2 |
|
attribute-based |
2 |
|
authenticated key exchange |
2 |
|
authentication |
2 |
|
certificate based |
2 |
|
chosen-ciphertext attack |
2 |
|
cloud computing |
2 |
|
convertible undeniable signature |
2 |
|
cryptocurrencies |
2 |
|
data privacy |
2 |
|
data sharing |
2 |
|
decentralization |
2 |
|
decryption outsourcing |
2 |
|
differential privacy |
2 |
|
digital signatures |
2 |
|
dual encryption system |
2 |
|
electric vehicles |
2 |
|
event-oriented |
2 |
|
group signature |
2 |
|
id-based cryptography |
2 |
|
indistinguishability obfuscation |
2 |
|
k-times |
2 |
|
kem |
2 |
|
key encapsulation mechanism |
2 |
|
linkability |
2 |
|
m-lwe/sis |
2 |
|
multi-hop |
2 |
|
optimistic fair exchange |
2 |
|
pairings |
2 |
|
personal health record |
2 |
|
post quantum |
2 |
|
privacy-enhanced revocation |
2 |
|
random oracle model |
2 |
|
random oracles |
2 |
|
reservation |
2 |
|
revocable |
2 |
|
revocable anonymity |
2 |
|
sdvs |
2 |
|
security |
2 |
|
security mediator |
2 |
|
sharing |
2 |
|
signature |
2 |
|
smart contract |
2 |
|
standard model |
2 |
|
sum argument |
2 |
|
supersingular elliptic curve isogeny |
2 |
|
threshold |
2 |
|
threshold ring signatures |
2 |
|
unidirectional proxy re-encryption |
2 |
|
user revocation |
2 |
|
vehicular sensor networks |
2 |
|
abstract stern-like protocol |
1 |
|
accountability |
1 |
|
accountable anonymity |
1 |
|
accountable privacy |
1 |
|
accumulator |
1 |
|
ad hoc group |
1 |
|
adaptive chosen-cipher text security |
1 |
|
adaptive chosen-ciphertext security |
1 |
|
algebraic signature |
1 |
|
android and ios |
1 |
|
android devices |
1 |
|
android-app-analysis |
1 |
|
android-packer |
1 |
|
anonymous blacklisting |
1 |
|
anonymous credential |
1 |
|
anonymous identification |
1 |
|
anonymous roaming |
1 |
|
applied cryptography |
1 |
|
arm-etm |
1 |
|
assured data deletion |
1 |
|
attribute based encryption |
1 |
|
attribute-based encryption |
1 |
|
auditable |
1 |
|
authenticity |
1 |
|
b2c |
1 |
|
bandwidth |
1 |
|
behavioral profiling |
1 |
|
big data |
1 |
|
bilinear pairing |
1 |
|
bilinear pairings |
1 |
|
biometric input |
1 |
|
blacklistable anonymous credential |
1 |
|
blind signature |
1 |
|
blockchain enabled auditing |
1 |
|
blockchain technology |
1 |
|
bloom filter |
1 |
|
bounded accumulator |
1 |
|
bounded retrieval model |
1 |
|
broadcast encryption |
1 |
|
cc-rka |
1 |
|
cc-rka security |
1 |
|
certificateless encryption |
1 |
|
certificateless signature |
1 |
|
challenge-based mechanism |
1 |
|
challenge-based trust mechanism |
1 |
|
charging threat |
1 |
|
chosen ciphertext attack |
1 |
|
chosen-ciphertext attacks |
1 |
|
chosen-ciphertext security |
1 |
|
chosen-key model |
1 |
|
ciphertext- policy attribute-based proxy re-encryption |
1 |
|
ciphertext-policy attribute-based encryption |
1 |
|
ciphertext-policy attribute-based proxy re-encryption |
1 |
|
cloud |
1 |
|
cloud data storage |
1 |
|
cloud security |
1 |
|
cloud storage |
1 |
|
cm-rka |
1 |
|
coin-traceability |
1 |
|
collaborative intrusion detection |
1 |
|
collaborative network |
1 |
|
collusion |
1 |
|
collusion attack |
1 |
|
collusion resistance |
1 |
|
command and control |
1 |
|
compact |
1 |
|
compact e-cash |
1 |
|
computation cost |
1 |
|
computational diffie-hellman assumption |
1 |
|
computational hiding |
1 |
|
concurrent signatures |
1 |
|
confidential transactions |
1 |
|
conjunctive keyword search |
1 |
|
consortium blockchain |
1 |
|
constant size |
1 |
|
constant-size |
1 |
|
cost-effective |
1 |
|
criminal smart contract |
1 |
|
crob |
1 |
|
cross-system |
1 |
|
crowdsensing |
1 |
|
cryptocurrency |
1 |
|
cryptography |
1 |
|
cryptonote |
1 |
|
cuckoo filter |
1 |
|
data anonymity |
1 |
|
data confidentiality |
1 |
|
data feed |
1 |
|
data integrity |
1 |
|
data possession checking |
1 |
|
ddos |
1 |
|
decentralized anonymous credential |
1 |
|
decentralized payment system |
1 |
|
decentralized storage |
1 |
|
delegation |
1 |
|
deniability |
1 |
|
designated verifier signature |
1 |
|
detection performance |
1 |
|
digital signature |
1 |
|
directly revocable |
1 |
|
divisible on-line/off-line signatures |
1 |
|
dos-eu-cma |
1 |
|
dual system encryption |
1 |
|
dual system methodology |
1 |
|
dynamic auditing |
1 |
|
dynamic k-taa |
1 |
|
e-cash |
1 |
|
e-voting |
1 |
|
efficiency |
1 |
|
electric vehicle |
1 |
|
electronic voting |
1 |
|
emerging network |
1 |
|
encodings |
1 |
|
encrypted filter |
1 |
|
encryption |
1 |
|
energy consumption |
1 |
|
enhanced model |
1 |
|
enhanced security model |
1 |
|
escrowed deniability |
1 |
|
evoting |
1 |
|
factorization |
1 |
|
fairness |
1 |
|
false alarm reduction |
1 |
|
filtering |
1 |
|
filtering service |
1 |
|
fine-grained access control |
1 |
|
firewall |
1 |
|
fog computing |
1 |
|
functional encryption |
1 |
|
functional proxy re-encryption |
1 |
|
fuzzy access-control |
1 |
|
fuzzy data |
1 |
|
fuzzy public-key encryption |
1 |
|
game theory |
1 |
|
geographical location |
1 |
|
graph metric |
1 |
|
graphical passwords |
1 |
|
group signatures |
1 |
|
hash proof system |
1 |
|
hibe |
1 |
|
homomorphic encryption |
1 |
|
homomorphic hashing |
1 |
|
identification |
1 |
|
identity test |
1 |
|
identity-based |
1 |
|
identity-based broadcast encryption |
1 |
|
identity-based cryptography |
1 |
|
identity-based encryption |
1 |
|
identity-based revocation system |
1 |
|
identity-based signature |
1 |
|
implementation |
1 |
|
increasing maximal revocation number |
1 |
|
inner product encryption |
1 |
|
insider attack |
1 |
|
intercloud |
1 |
|
internet of things |
1 |
|
internet of vehicles |
1 |
|
intrusion detection |
1 |
|
intrusion effort |
1 |
|
ip networks |
1 |
|
juice filming charging attack |
1 |
|
k-anonymity |
1 |
|
key escrow |
1 |
|
lattice-based cryptography |
1 |
|
lattice-based universal accumulator |
1 |
|
leakage attack |
1 |
|
leakage resilient cryptography |
1 |
|
lightweight |
1 |
|
lightweight verification |
1 |
|
line-of-business services |
1 |
|
linear related-key attack |
1 |
|
linkable ring signature |
1 |
|
local differential privacy |
1 |
|
location privacy |
1 |
|
location verification |
1 |
|
logic gates |
1 |
|
malicious node |
1 |
|
map-based password authentication |
1 |
|
medical cyber–physical system |
1 |
|
medical smartphone network |
1 |
|
message authentication |
1 |
|
mobile botnet |
1 |
|
mobile cloud |
1 |
|
mobile could |
1 |
|
mobile device |
1 |
|
mobile device capabilities |
1 |
|
mobile operating systems |
1 |
|
mobile privacy and security |
1 |
|
mobile security and privacy |
1 |
|
mobile threats |
1 |
|
multilinear map |
1 |
|
multiple |
1 |
|
non-membership proofs |
1 |
|
obfuscations |
1 |
|
ocr technology |
1 |
|
on-line/off-line signatures |
1 |
|
one-time password |
1 |
|
one-time-password (otp) |
1 |
|
online survey |
1 |
|
os-eu-cma |
1 |
|
pair encoding |
1 |
|
pair encodings |
1 |
|
pairing-based cryptography |
1 |
|
partial fourier recovery problem |
1 |
|
payment system |
1 |
|
pkg |
1 |
|
policy |
1 |
|
position based cryptography |
1 |
|
post-quantum cryptography |
1 |
|
practicality |
1 |
|
predicate |
1 |
|
predicate encryption |
1 |
|
priced oblivious transfer |
1 |
|
prime order groups |
1 |
|
privacy model |
1 |
|
privacy preserving |
1 |
|
privacy-preserving graph analysis |
1 |
|
procurement |
1 |
|
protocols |
1 |
|
provable security |
1 |
|
proxy re-encryption |
1 |
|
proxy signature |
1 |
|
pubilc key encrytion |
1 |
|
public auditability |
1 |
|
public extraction |
1 |
|
public key |
1 |
|
public key cryptography |
1 |
|
public key encryption |
1 |
|
public-key encryption |
1 |
|
purchasing privacy |
1 |
|
q-learning |
1 |
|
qr code |
1 |
|
query processing |
1 |
|
random oracle |
1 |
|
randomness extraction |
1 |
|
range query |
1 |
|
related-key attack |
1 |
|
remote data integrity checking |
1 |
|
reputation |
1 |
|
restricted adaptive attacks |
1 |
|
retrievability |
1 |
|
revocable certificateless signature |
1 |
|
revocation |
1 |
|
risk assessment |
1 |
|
rka security |
1 |
|
robustness |
1 |
|
rogue key attack |
1 |
|
rsa cryptosystem |
1 |
|
scenarios |
1 |
|
search |
1 |
|
searchable encryption |
1 |
|
searchable symmetric encryption |
1 |
|
secure |
1 |
|
secure channel free |
1 |
|
security analysis |
1 |
|
security and privacy |
1 |
|
security and usability |
1 |
|
selective opening security for receivers |
1 |
|
semi-static |
1 |
|
semi-supervised learning |
1 |
|
server-aided computation |
1 |
|
short ciphertexts |
1 |
|
short signature |
1 |
|
short-parameter construction |
1 |
|
signatures |
1 |
|
signcryption |
1 |
|
simulation-based security |
1 |
|
sme |
1 |
|
spatial encryption |
1 |
|
standard assumption |
1 |
|
statistical trust computation |
1 |
|
subjective blacklisting |
1 |
|
tampering attack |
1 |
|
test-bed |
1 |
|
threshold cryptosystem |
1 |
|
traceability |
1 |
|
transaction integrity |
1 |
|
transaction verification |
1 |
|
transaction-authentication-number (tan) |
1 |
|
transferability |
1 |
|
trust |
1 |
|
trust computation |
1 |
|
trust computation and management |
1 |
|
trust evaluation |
1 |
|
trust management |
1 |
|
trusted hardware |
1 |
|
twisted elgamal |
1 |
|
two party ring signatures |
1 |
|
ubiquitous computing |
1 |
|
unforgeability |
1 |
|
untraceability |
1 |
|
user authentication |
1 |
|
user misbehavior |
1 |
|
vehicular network |
1 |
|
verifiable ciphertext delegation |
1 |
|
verifiable encryption |
1 |
|
verifiable search |
1 |
|
verification |
1 |
|
visual cryptography |
1 |
|
watermarkable prf |
1 |
|
watermarking |
1 |
|
weak computational device |
1 |
|
zero knowledge |
1 |
|
zero-knowledge arguments of nonmembership |
1 |
|
zero-knowledge proof |
1 |
|
zero-knowledge proof of knowledge |
1 |