Computer Science
Private Set Intersection
100%
Privacy Preserving
40%
Edge Computing
33%
User Privacy
30%
public key
26%
Fully Homomorphic Encryption
20%
Multiple Network
20%
Intersection Set
20%
Small Experiment
20%
Plaintext Attack
20%
Security Requirements
20%
Secure Protocol
20%
Network Security
20%
Malicious Adversary
20%
Cardinality
20%
Information Retrieval
20%
Optimization Problem
20%
Distributed Algorithm
20%
Building-Blocks
20%
Wildcard
20%
Data Item
20%
Client Server
20%
Parameter Value
20%
Parallelization
20%
Provider Service
20%
Large Data Set
20%
Ciphertext
20%
Linear Program
20%
PSI Cardinality
20%
Network Operator
20%
Internet of Things
16%
User Experience
16%
Cuckoo Hashing
13%
Access Pattern
13%
Diffie-Hellman-Merkle key exchange
12%
Bandwidth Requirement
10%
Optimization Framework
10%
Privacy Preserving Machine Learning
10%
Security Attack
10%
Security Concern
10%
Network Traffic
10%
Robust Optimization
10%
Privacy Protection
10%
Computing Resource
10%
Wide Area Network
10%
Single Message
10%
Robust Solution
10%
Data Structure
8%
Programming Model
6%
Mixed-Integer Linear Programming
6%
Keyphrases
Private Set Intersection
40%
Symmetric Key
35%
Private Set Intersection Cardinality
32%
Semi-honest
26%
Malicious Setting
21%
Fully Homomorphic Encryption
20%
Prescription Drug Management
20%
Distinguishing Attack
20%
Slide Attack
20%
General Domain
20%
Encryption Standard
20%
Known-plaintext Attack
20%
Contact Tracing
20%
Vaccine Passport
20%
Oblivious Transfer Extension
20%
Privacy-preserving
20%
Wildcard Pattern Matching
20%
Cooperative Caching
20%
Shared Outputs
20%
Format-preserving Encryption
20%
Small Domains
20%
Private Set Union
20%
Cache Sharing
20%
Edge Service Placement
20%
Cut-and-choose
20%
Lightweight Clients
20%
Garbled Circuits
20%
Feistel
15%
Technical Core
15%
Binary Optimization Problem
13%
Quadratic Unconstrained Binary Optimization
13%
Pseudorandom Functions
13%
Network Operator
10%
Multiplex Networks
10%
Set Size
10%
Operation Quality
10%
Fuzzy Method
10%
Economic Ecology
10%
Client Needs
10%
Single Key
10%
Message Size
10%
Cryptographic Protocols
10%
Multiple Parties
10%
Malicious Adversary
10%
Access Frequency
10%
Private Membership Test
10%
Ciphertext
10%
Sharing Framework
10%
Known Plaintext
10%
Key-value Store
10%