Computer Science
Differential Privacy
100%
Location Data
74%
Location Privacy
61%
Mobile Device
53%
Privacy Preserving
42%
Protecting Location Privacy
35%
Data Provenance
30%
Association Rules
30%
Scalar Product
26%
Trustworthiness Data
25%
Information Loss
25%
Experimental Result
25%
Anonymity
23%
Hybrid Technique
23%
Security Analysis
23%
Cloaking Region
20%
Temporal Information
20%
Location-Based Service
20%
Cryptographic Technique
20%
Privacy Concern
20%
distributed hash table
20%
Decision-Making
17%
Privacy Policies
17%
Provider Service
17%
Wireless Sensor Network
15%
Sensor Networks
15%
Hybrid Approach
15%
Record Matching
15%
Counting Sequence
15%
Transactional Data
15%
Space Requirement
15%
Network Operation
15%
Secure Location
15%
Performance Trade
15%
Spatial Information
15%
Assignment Method
15%
Processing Unit
15%
Exist Algorithm
15%
Subscribe System
15%
Social Network
15%
Spatial Location
15%
Resource Provisioning
15%
Range Query
15%
Inner Product Encryption
15%
Flow Information
15%
Business Interest
15%
Personal Detail
15%
Security Incident
15%
Communication Overhead
15%
Neural Network Training
15%
Keyphrases
Secure Provenance
30%
Privacy-preserving
30%
Location Update
30%
Scalar Product
26%
Data Trustworthiness
23%
Searchable Encryption
23%
Policy Similarity
21%
Location Privacy
20%
Capture the Flag
20%
Pairing-based Cryptography
17%
Secure Scheme
15%
Sensor Data
15%
Additional Nodes
15%
In-packet Bloom Filters
15%
Large-scale Sensor Networks
15%
Lightweight Scheme
15%
Data Provenance
15%
Differential Privacy
15%
Sanitation Procedures
15%
Cloaking Region
15%
Velocity-based
15%
Distributed Mobile Systems
15%
Anonymizer
15%
Location-based Queries
15%
Adaptive Stabilization
15%
Link Flooding Attack
15%
Private Information Retrieval
15%
Transactional Data
15%
Data Disclosure
15%
Short Sequence
15%
Identity Inference
15%
Database Concepts
15%
External Events
15%
Geographic Information Retrieval
15%
Performance Tradeoff
15%
Graph Embedding
15%
Trajectory Anonymization
15%
Dual Perspective
15%
Secure kNN
15%
Private Query
15%
Untrusted Cloud Environment
15%
Privacy-enhanced
15%
Publish-subscribe Systems
15%
Wireless Sensor Networks
15%
Obfuscator
15%
High Assurance
15%
Mobile Users
15%
Sliding-window Queries
15%
Differentially Private
15%
BLE Beacon
15%