Keyphrases
Access Policy
100%
Computation Time
100%
Encryption
100%
IoT System
100%
Blockchain for IoT
100%
IoT Privacy
100%
Secure Hash Function
100%
Elliptic Curve Integrated Encryption Scheme
100%
User Access
100%
Successful Implementation
50%
Confidentiality
50%
Correlation Coefficient
50%
Privacy Protection
50%
System Reliability
50%
Security Privacy
50%
Data Access
50%
Personal Data
50%
Decryption
50%
Blockchain Technology
50%
Security Strength
50%
IoT Security
50%
User-dependent
50%
Secure Key
50%
Master Key
50%
Privacy in IoT
50%
Key Derivation Function
50%
Lack of Privacy
50%
Computer Science
Encryption Scheme
100%
Blockchain
100%
Elliptic Curve
100%
Hash Function
100%
Internet-Of-Things
100%
Computation Time
66%
Privacy Protection
33%
Data Access
33%
Security and Privacy
33%
Request Transaction
33%
Key Derivation Function
33%
Successful Implementation
33%
Personal Data
33%
Dependent Variable
33%
Decryption
33%