Computer Science
Private Set Intersection
100%
Attribute-Based Encryption
100%
Blind Signature
100%
Information System
100%
System Calls
100%
Access Control
100%
Privacy Preserving
100%
vehicular ad-hoc network
100%
Formal Definition
50%
Enhancing Technology
50%
Pathological Case
50%
Encryption Scheme
37%
Bloom Filter
33%
Grained Access Control
25%
Robust Solution
25%
Security and Privacy
25%
Privacy Requirement
25%
Security Requirements
25%
Intelligent Transportation System
25%
Vehicular Network
25%
Malicious Behavior
25%
Communication Complexity
16%
Privacy-Preserving Technique
16%
Research Community
16%
Practical Solution
16%
Use Case
16%
Fundamental Problem
16%
Plaintext Data
12%
Control Requirement
12%
Computational Cost
12%
Multiple Domain
12%
Keyphrases
Privacy Engineering
100%
Private Set Intersection
100%
Attribute-based Encryption
100%
Pairing-based
100%
Multi-party Setting
83%
Blind Signature
66%
Attribute-based Encryption Scheme
60%
Privacy Management
50%
Fine-grained Access Control
40%
Bloom Filter
33%
Indistinguishability
33%
Network Safety
20%
Multi-authority
20%
Cryptographic Approach
20%
Strong Security
20%
Secure Access Control
20%
Security Assurance
20%
Plaintext Data
20%
Set Operations
16%
Communication Complexity
16%
Semi-honest Model
16%