Computer Science
Ciphertext
100%
Attribute-Based Encryption
92%
Internet of Things
36%
Block Cipher
30%
Wireless Sensor Network
24%
Encryption
24%
Encryption Scheme
23%
Privacy Concern
22%
Encryption System
19%
Fog Computing
18%
And Gate
18%
Optimization Software
18%
Package Manager
18%
Metadata Information
18%
Research Direction
18%
Technology Infrastructure
18%
Critical Infrastructure
18%
Data Sharing
18%
Smart Contract
18%
public-key encryption
18%
Pilot Interview
18%
Interview Study
18%
User Data
18%
Security Requirements
14%
Supply Chain
12%
Software Development
12%
Security Vulnerability
12%
Lightweight Cryptography
12%
Privacy Protection
11%
Access Control Policies
9%
Cyber Criminal
9%
Security Solution
9%
Cyber Security Research
9%
Data Privacy
9%
Security and Privacy
9%
Data Security
9%
Security Concern
9%
Technology Domain
9%
Security Challenge
9%
Decryption
7%
Access Rights
6%
Key Management
6%
Smart Device
6%
Data Encryption
6%
Modern Software
6%
Software Repository
6%
Smart City
6%
Privacy Challenge
6%
False Positive
6%
Adversarial Machine Learning
6%
Keyphrases
Ciphertext-policy Attribute-based Encryption (CP-ABE)
55%
Access Policy
44%
Access Policy Update
36%
Cybersecurity
36%
Privacy Concerns
32%
Encryptor
24%
Attribute-based Encryption
24%
Attribute-based Encryption Scheme
21%
Short Ciphertext
18%
Industry Report
18%
Agricultural Industry
18%
User Data Collection
18%
Scoping Review
18%
Agriculture
18%
Package Manager
18%
Outsourced Computation
18%
Abuse Resistance
18%
Public Key Encryption with Equality Test
18%
Metadata Information
18%
Privacy Regulation
18%
Analytical Review
18%
Software Optimization
18%
Organizational Data
18%
Data Sharing
18%
Smart Contract
18%
Privacy Framework
18%
Cyberspace
18%
Decryption
15%
Ciphertext
15%
Software Development
12%
Software Supply Chain
12%
Multi-sequence
11%
Constant-size Ciphertext
11%
Scoping Study
11%
Interview Study
9%
Agrotechnology
9%
Risk Areas
9%
Privacy Protection
9%
Responsible Stakeholder
9%
User Activity
9%
Technical Guidance
9%
Encryption System
8%
Security Requirements
8%
One-to-many Encryption
8%
Provable Security
8%
Access Control Policy
8%
Access Control
8%
Revocation
8%
Third-party Packages
6%
Low-power Devices
6%