Keyphrases
Fully Homomorphic Encryption
89%
Internet of Things
85%
Homomorphic Encryption
68%
Elliptic Curve Digital Signature Algorithm (ECDSA)
63%
Cryptographic Libraries
63%
Lightweight Block Cipher
63%
Certificateless
63%
Functional Encryption
63%
Privacy-preserving Machine Learning
63%
Resource-constrained Devices
52%
Encryption Scheme
48%
Internet of Things Devices
44%
Cloud-based
42%
Effective Treatment
37%
Contiki-NG
36%
Machine Learning
36%
Encrypted Data
33%
Resource-constrained
33%
Tool Effectiveness
31%
Noise Interaction
31%
Ciphertext-policy Attribute-based Encryption (CP-ABE)
31%
Internet Behavior
31%
Broken Glass
31%
Contiki
31%
Media Platforms
31%
Drone
31%
Bandwidth Efficient
31%
Service Technology
31%
Multi-input Functional Encryption
31%
Fog-based
31%
Obfuscation
31%
Key Distribution Scheme
31%
Open Science
31%
Facebook
31%
Precision Livestock Farming
31%
Instagram
31%
Dropout
31%
User Interaction
31%
Medical Records
31%
Big Data Service
31%
Elliptic Curves
31%
Privacy-preserving Protocols
31%
Access Control
31%
AI Technology
31%
Precision Agriculture
31%
Social Networks
31%
Reproducible Research
31%
Time Series Data
31%
Social Media Platforms
31%
Data Aggregation
31%
Computer Science
Internet-Of-Things
100%
Homomorphic Encryption
94%
Encryption Scheme
63%
Privacy Preserving Machine Learning
63%
Learning System
53%
Constrained Device
50%
Encrypted Data
46%
Machine Learning
43%
Internet of Things Device
42%
Privacy Preserving
42%
Decryption
42%
Ciphertext
34%
User Interaction
31%
Data Services
31%
Attribute-Based Encryption
31%
Obfuscation
31%
Medical Record
31%
Key Distribution
31%
Electronic Medical Record
31%
Access Control
31%
group key
31%
Time Series Data
31%
Facebook
31%
Instagram
31%
Encryption Service
31%
Elliptic Curve Digital Signature Algorithm
31%
Social Medium Platform
31%
Instantiation
31%
Big Data
31%
Elliptic Curve
31%
Data Aggregation
31%
Social Network
31%
Artificial Intelligence
31%
Secure Communication
26%
Constrained Nature
26%
Decision-Making
22%
Experimental Result
22%
Use Case
21%
Symmetric Cryptography
20%
Access Control System
15%
Computational Resource
15%
Core Component
15%
Distributed Access Control
15%
Computing Infrastructure
15%
Resource Access
15%
Open Source Platform
15%
Value Chain
15%
Centralized Approach
15%
High-Performance Computing
15%
Data Processing
15%