Computer Science
Diffie-Hellman-Merkle key exchange
100%
public key
84%
Encryption Scheme
76%
Communication Cost
65%
Storage System
53%
Signature Scheme
53%
Cloud Storage
53%
Decryption
53%
Ciphertext
48%
Access Control
48%
group key management
46%
Storage Server
44%
random oracle model
40%
group key
38%
Encrypted Data
35%
Deep Reinforcement Learning
34%
Experimental Result
31%
proxy re encryption
30%
Cryptography
29%
Botnets
29%
Cloud Storage Provider
29%
provably secure
28%
Key Management Scheme
27%
Broadcast Channel
26%
Integrity Check
26%
Botnet Detection
26%
Secret Sharing
26%
Cryptographic Technique
26%
Automaton
25%
Privacy Preserving
24%
Data Confidentiality
24%
Key Generation
23%
Networked Storage
23%
Computational Complexity
23%
Key Distribution
23%
Exchanged Message
23%
Information Security
23%
Network Security
23%
Trust Management
23%
Authentication
23%
ring signature
23%
Cloud Storage System
23%
Key Establishment
23%
Full Advantage
23%
Fault Tolerant
23%
Research Results
23%
Visual Cryptography
23%
Routing Algorithm
23%
Software-Defined Networking
23%
Computation Cost
22%
Keyphrases
Public Key
64%
Oblivious Transfer
52%
Conference Key
46%
Transfer Scheme
46%
Group Key Management
46%
Deep Reinforcement Learning (deep RL)
46%
Private Key
45%
Sender
44%
Storage Server
42%
Communication Cost
42%
Secret Key
39%
Cloud Storage
35%
Signature Scheme
34%
Conference Key Agreement
34%
Key Agreement Protocol
34%
Code-based
34%
Traitor Tracing Schemes
34%
Cloud Service Provider
34%
Group Key
34%
Ciphertext
33%
Provable Security
32%
Distinctive Features
30%
Storage System
30%
Proxy Re-encryption
30%
Computational Diffie-Hellman Problem
30%
Encrypted Data
29%
Key Assignment Scheme
29%
Key Management Scheme
27%
Key Update
26%
Integrity Checking
26%
Erasure Codes
26%
Botnet Detection
26%
Access Control Mechanism
26%
Decentralized Erasure Code
25%
Unconditionally Secure
25%
Access Control
25%
Decryption
24%
Data Confidentiality
24%
Permutation Arrays
23%
Group-oriented
23%
Revocation
23%
Networked Storage System
23%
Cloud Storage System
23%
Strategic Analysis
23%
Data Access
23%
K-out-of-n System
23%
Stamping
23%
Key Distribution Scheme
23%
Fault-tolerant
23%
Routing Algorithm
23%