Keyphrases
Proxy Re-encryption
100%
Provenance Graph
78%
Access Control
73%
Directed Acyclic Graph
53%
Confidentiality
46%
Provenance Data
40%
All-or-nothing Transform
37%
Multiple Versions
33%
Secure Provenance
33%
Application Attack
33%
Reapplication
33%
Parent Node
33%
Symmetric Cryptography
33%
Management Guide
33%
Untrusted Environment
33%
Distributed Processes
33%
Difference Hash
33%
Anti-counterfeiting
33%
5G Networks
33%
Security Management
33%
Microsoft
33%
Hash-based
33%
Customer Churn Prediction
33%
Customer Churn Analysis
33%
Data Mining Model
33%
Performance Analysis
33%
Stickiness
33%
Aggregate Authentication
33%
Churn Customer
33%
Batik Tulis
33%
Banking Industry
33%
Graph Model
33%
Risk Analysis Methods
33%
Internet of Healthcare Things (IoHT)
33%
E-tourism
33%
Efficiency Improvement
33%
Digital Documents
33%
Ciphertext
26%
Digital Signature
23%
Plaintext
22%
Signature Scheme
22%
Customer Churn
22%
Internet of Things Applications
22%
Authenticator
22%
Authentication Scheme
22%
Classification Methods
22%
Aggregation Nodes
22%
Access Control Model
21%
Symmetric Cipher
20%
Data Storage
19%
Computer Science
proxy re encryption
100%
Encryption Scheme
85%
Access Control
77%
Directed Acyclic Graph
66%
Information Storage
44%
Multiple Version
33%
Storage Requirement
33%
Symmetric Key Cryptography
33%
Untrusted Environment
33%
Distributed Process
33%
Attack Scenario
33%
Influencing Factor
33%
Hash Function
33%
Data Mining Model
33%
Risk Analysis
33%
Performance Analysis
33%
Security Management
33%
Authentication
33%
Digital Document
33%
Public-Key Cryptography
33%
Internet-Of-Things
33%
Cultural Heritage
33%
5G Mobile Communication
33%
Access Control Policies
30%
Ciphertext
30%
Digital Signature
27%
Signature Scheme
22%
Relational Database
22%
Authenticator
22%
Aggregation Node
22%
authentication scheme
22%
Symmetric Cipher
20%
Causal Relationship
19%
Collected Data
16%
Critical Success Factor
16%
Research Framework
16%
Classification Technique
16%
Strategic Action
16%
Data Mining
16%
Classification Method
16%
Sampling Data
16%
Machine Learning
16%
Learning System
16%
Support Vector Machine
16%
Controlling Access
11%
Perform Experiment
11%
Computer System
11%
Authentication System
11%
Security Mechanism
11%
Database Systems
11%