anonymity |
5 |
oblivious transfer |
5 |
ring signature |
5 |
access policies |
4 |
data-base servers |
4 |
database records |
4 |
generic construction |
4 |
linkable |
4 |
ring signatures |
4 |
the standard model |
4 |
blockchain |
3 |
cp-abe |
3 |
k-taa |
3 |
privacy |
3 |
access control |
2 |
anonymous access |
2 |
anonymous authentication |
2 |
artificial intelligence |
2 |
attribute-based |
2 |
authenticated key exchange |
2 |
authentication |
2 |
certificate based |
2 |
chosen-ciphertext attack |
2 |
cloud computing |
2 |
convertible undeniable signature |
2 |
cryptocurrencies |
2 |
data privacy |
2 |
data sharing |
2 |
decentralization |
2 |
decryption outsourcing |
2 |
differential privacy |
2 |
digital signatures |
2 |
dual encryption system |
2 |
electric vehicles |
2 |
event-oriented |
2 |
group signature |
2 |
id-based cryptography |
2 |
indistinguishability obfuscation |
2 |
k-times |
2 |
kem |
2 |
key encapsulation mechanism |
2 |
linkability |
2 |
m-lwe/sis |
2 |
multi-hop |
2 |
optimistic fair exchange |
2 |
pairings |
2 |
personal health record |
2 |
post quantum |
2 |
privacy-enhanced revocation |
2 |
random oracle model |
2 |
random oracles |
2 |
reservation |
2 |
revocable |
2 |
revocable anonymity |
2 |
sdvs |
2 |
security |
2 |
security mediator |
2 |
sharing |
2 |
signature |
2 |
smart contract |
2 |
standard model |
2 |
sum argument |
2 |
supersingular elliptic curve isogeny |
2 |
threshold |
2 |
threshold ring signatures |
2 |
unidirectional proxy re-encryption |
2 |
user revocation |
2 |
vehicular sensor networks |
2 |
abstract stern-like protocol |
1 |
accountability |
1 |
accountable anonymity |
1 |
accountable privacy |
1 |
accumulator |
1 |
ad hoc group |
1 |
adaptive chosen-cipher text security |
1 |
adaptive chosen-ciphertext security |
1 |
algebraic signature |
1 |
android and ios |
1 |
android devices |
1 |
android-app-analysis |
1 |
android-packer |
1 |
anonymous blacklisting |
1 |
anonymous credential |
1 |
anonymous identification |
1 |
anonymous roaming |
1 |
applied cryptography |
1 |
arm-etm |
1 |
assured data deletion |
1 |
attribute based encryption |
1 |
attribute-based encryption |
1 |
auditable |
1 |
authenticity |
1 |
b2c |
1 |
bandwidth |
1 |
behavioral profiling |
1 |
big data |
1 |
bilinear pairing |
1 |
bilinear pairings |
1 |
biometric input |
1 |
blacklistable anonymous credential |
1 |
blind signature |
1 |
blockchain enabled auditing |
1 |
blockchain technology |
1 |
bloom filter |
1 |
bounded accumulator |
1 |
bounded retrieval model |
1 |
broadcast encryption |
1 |
cc-rka |
1 |
cc-rka security |
1 |
certificateless encryption |
1 |
certificateless signature |
1 |
challenge-based mechanism |
1 |
challenge-based trust mechanism |
1 |
charging threat |
1 |
chosen ciphertext attack |
1 |
chosen-ciphertext attacks |
1 |
chosen-ciphertext security |
1 |
chosen-key model |
1 |
ciphertext- policy attribute-based proxy re-encryption |
1 |
ciphertext-policy attribute-based encryption |
1 |
ciphertext-policy attribute-based proxy re-encryption |
1 |
cloud |
1 |
cloud data storage |
1 |
cloud security |
1 |
cloud storage |
1 |
cm-rka |
1 |
coin-traceability |
1 |
collaborative intrusion detection |
1 |
collaborative network |
1 |
collusion |
1 |
collusion attack |
1 |
collusion resistance |
1 |
command and control |
1 |
compact |
1 |
compact e-cash |
1 |
computation cost |
1 |
computational diffie-hellman assumption |
1 |
computational hiding |
1 |
concurrent signatures |
1 |
confidential transactions |
1 |
conjunctive keyword search |
1 |
consortium blockchain |
1 |
constant size |
1 |
constant-size |
1 |
cost-effective |
1 |
criminal smart contract |
1 |
crob |
1 |
cross-system |
1 |
crowdsensing |
1 |
cryptocurrency |
1 |
cryptography |
1 |
cryptonote |
1 |
cuckoo filter |
1 |
data anonymity |
1 |
data confidentiality |
1 |
data feed |
1 |
data integrity |
1 |
data possession checking |
1 |
ddos |
1 |
decentralized anonymous credential |
1 |
decentralized payment system |
1 |
decentralized storage |
1 |
delegation |
1 |
deniability |
1 |
designated verifier signature |
1 |
detection performance |
1 |
digital signature |
1 |
directly revocable |
1 |
divisible on-line/off-line signatures |
1 |
dos-eu-cma |
1 |
dual system encryption |
1 |
dual system methodology |
1 |
dynamic auditing |
1 |
dynamic k-taa |
1 |
e-cash |
1 |
e-voting |
1 |
efficiency |
1 |
electric vehicle |
1 |
electronic voting |
1 |
emerging network |
1 |
encodings |
1 |
encrypted filter |
1 |
encryption |
1 |
energy consumption |
1 |
enhanced model |
1 |
enhanced security model |
1 |
escrowed deniability |
1 |
evoting |
1 |
factorization |
1 |
fairness |
1 |
false alarm reduction |
1 |
filtering |
1 |
filtering service |
1 |
fine-grained access control |
1 |
firewall |
1 |
fog computing |
1 |
functional encryption |
1 |
functional proxy re-encryption |
1 |
fuzzy access-control |
1 |
fuzzy data |
1 |
fuzzy public-key encryption |
1 |
game theory |
1 |
geographical location |
1 |
graph metric |
1 |
graphical passwords |
1 |
group signatures |
1 |
hash proof system |
1 |
hibe |
1 |
homomorphic encryption |
1 |
homomorphic hashing |
1 |
identification |
1 |
identity test |
1 |
identity-based |
1 |
identity-based broadcast encryption |
1 |
identity-based cryptography |
1 |
identity-based encryption |
1 |
identity-based revocation system |
1 |
identity-based signature |
1 |
implementation |
1 |
increasing maximal revocation number |
1 |
inner product encryption |
1 |
insider attack |
1 |
intercloud |
1 |
internet of things |
1 |
internet of vehicles |
1 |
intrusion detection |
1 |
intrusion effort |
1 |
ip networks |
1 |
juice filming charging attack |
1 |
k-anonymity |
1 |
key escrow |
1 |
lattice-based cryptography |
1 |
lattice-based universal accumulator |
1 |
leakage attack |
1 |
leakage resilient cryptography |
1 |
lightweight |
1 |
lightweight verification |
1 |
line-of-business services |
1 |
linear related-key attack |
1 |
linkable ring signature |
1 |
local differential privacy |
1 |
location privacy |
1 |
location verification |
1 |
logic gates |
1 |
malicious node |
1 |
map-based password authentication |
1 |
medical cyber–physical system |
1 |
medical smartphone network |
1 |
message authentication |
1 |
mobile botnet |
1 |
mobile cloud |
1 |
mobile could |
1 |
mobile device |
1 |
mobile device capabilities |
1 |
mobile operating systems |
1 |
mobile privacy and security |
1 |
mobile security and privacy |
1 |
mobile threats |
1 |
multilinear map |
1 |
multiple |
1 |
non-membership proofs |
1 |
obfuscations |
1 |
ocr technology |
1 |
on-line/off-line signatures |
1 |
one-time password |
1 |
one-time-password (otp) |
1 |
online survey |
1 |
os-eu-cma |
1 |
pair encoding |
1 |
pair encodings |
1 |
pairing-based cryptography |
1 |
partial fourier recovery problem |
1 |
payment system |
1 |
pkg |
1 |
policy |
1 |
position based cryptography |
1 |
post-quantum cryptography |
1 |
practicality |
1 |
predicate |
1 |
predicate encryption |
1 |
priced oblivious transfer |
1 |
prime order groups |
1 |
privacy model |
1 |
privacy preserving |
1 |
privacy-preserving graph analysis |
1 |
procurement |
1 |
protocols |
1 |
provable security |
1 |
proxy re-encryption |
1 |
proxy signature |
1 |
pubilc key encrytion |
1 |
public auditability |
1 |
public extraction |
1 |
public key |
1 |
public key cryptography |
1 |
public key encryption |
1 |
public-key encryption |
1 |
purchasing privacy |
1 |
q-learning |
1 |
qr code |
1 |
query processing |
1 |
random oracle |
1 |
randomness extraction |
1 |
range query |
1 |
related-key attack |
1 |
remote data integrity checking |
1 |
reputation |
1 |
restricted adaptive attacks |
1 |
retrievability |
1 |
revocable certificateless signature |
1 |
revocation |
1 |
risk assessment |
1 |
rka security |
1 |
robustness |
1 |
rogue key attack |
1 |
rsa cryptosystem |
1 |
scenarios |
1 |
search |
1 |
searchable encryption |
1 |
searchable symmetric encryption |
1 |
secure |
1 |
secure channel free |
1 |
security analysis |
1 |
security and privacy |
1 |
security and usability |
1 |
selective opening security for receivers |
1 |
semi-static |
1 |
semi-supervised learning |
1 |
server-aided computation |
1 |
short ciphertexts |
1 |
short signature |
1 |
short-parameter construction |
1 |
signatures |
1 |
signcryption |
1 |
simulation-based security |
1 |
sme |
1 |
spatial encryption |
1 |
standard assumption |
1 |
statistical trust computation |
1 |
subjective blacklisting |
1 |
tampering attack |
1 |
test-bed |
1 |
threshold cryptosystem |
1 |
traceability |
1 |
transaction integrity |
1 |
transaction verification |
1 |
transaction-authentication-number (tan) |
1 |
transferability |
1 |
trust |
1 |
trust computation |
1 |
trust computation and management |
1 |
trust evaluation |
1 |
trust management |
1 |
trusted hardware |
1 |
twisted elgamal |
1 |
two party ring signatures |
1 |
ubiquitous computing |
1 |
unforgeability |
1 |
untraceability |
1 |
user authentication |
1 |
user misbehavior |
1 |
vehicular network |
1 |
verifiable ciphertext delegation |
1 |
verifiable encryption |
1 |
verifiable search |
1 |
verification |
1 |
visual cryptography |
1 |
watermarkable prf |
1 |
watermarking |
1 |
weak computational device |
1 |
zero knowledge |
1 |
zero-knowledge arguments of nonmembership |
1 |
zero-knowledge proof |
1 |
zero-knowledge proof of knowledge |
1 |