INIS
data
100%
cryptography
80%
graphs
67%
symmetry
62%
applications
55%
security
50%
control
45%
comparative evaluations
41%
storage
40%
origin
40%
performance
31%
implementation
26%
information
25%
children
24%
compartments
24%
commerce
20%
environment
20%
management
20%
risk analysis
20%
tourism
20%
efficiency
20%
prediction
20%
mining
20%
industry
20%
internet
20%
authentication
20%
documentation
19%
tools
17%
sampling
15%
values
13%
economics
13%
devices
13%
scanning electron microscopy
10%
images
10%
websites
10%
chains
10%
classification
10%
aggregation
10%
output
10%
increasing
7%
detection
6%
risks
6%
clouds
6%
asymmetry
5%
errors
5%
machine learning
5%
modeling
5%
indonesia
5%
banks
5%
vectors
5%
Keyphrases
Proxy Re-encryption
62%
Provenance Graph
49%
Access Control
45%
Directed Acyclic Graph
33%
Confidentiality
29%
Provenance Data
25%
All-or-nothing Transform
23%
Multiple Versions
20%
Secure Provenance
20%
Application Attack
20%
Reapplication
20%
Parent Node
20%
Symmetric Cryptography
20%
Management Guide
20%
Untrusted Environment
20%
Distributed Processes
20%
Difference Hash
20%
Anti-counterfeiting
20%
5G Networks
20%
Security Management
20%
Microsoft
20%
Hash-based
20%
Customer Churn Prediction
20%
Customer Churn Analysis
20%
Data Mining Model
20%
Performance Analysis
20%
Stickiness
20%
Aggregate Authentication
20%
Churn Customer
20%
Batik Tulis
20%
Banking Industry
20%
Graph Model
20%
Risk Analysis Methods
20%
Internet of Healthcare Things (IoHT)
20%
E-tourism
20%
Efficiency Improvement
20%
Digital Documents
20%
Ciphertext
16%
Digital Signature
14%
Plaintext
14%
Signature Scheme
13%
Customer Churn
13%
Internet of Things Applications
13%
Authenticator
13%
Authentication Scheme
13%
Classification Methods
13%
Aggregation Nodes
13%
Access Control Model
13%
Symmetric Cipher
13%
Data Storage
12%
Computer Science
proxy re encryption
62%
Encryption Scheme
53%
Access Control
48%
Directed Acyclic Graph
41%
Information Storage
27%
Multiple Version
20%
Storage Requirement
20%
Symmetric Key Cryptography
20%
Untrusted Environment
20%
Distributed Process
20%
Attack Scenario
20%
Influencing Factor
20%
Hash Function
20%
Data Mining Model
20%
Risk Analysis
20%
Performance Analysis
20%
Security Management
20%
Authentication
20%
Digital Document
20%
Public-Key Cryptography
20%
Internet-Of-Things
20%
Cultural Heritage
20%
5G Mobile Communication
20%
Access Control Policies
19%
Ciphertext
18%
Digital Signature
17%
Signature Scheme
13%
Relational Database
13%
Authenticator
13%
Aggregation Node
13%
authentication scheme
13%
Symmetric Cipher
13%
Causal Relationship
12%
Collected Data
10%
Critical Success Factor
10%
Research Framework
10%
Classification Technique
10%
Strategic Action
10%
Data Mining
10%
Classification Method
10%
Sampling Data
10%
Machine Learning
10%
Learning System
10%
Support Vector Machine
10%
Controlling Access
6%
Perform Experiment
6%
Computer System
6%
Authentication System
6%
Security Mechanism
6%
Database Systems
6%