Keyphrases
Authenticated Data Structures
79%
Query Authentication
73%
Query Result
67%
Confidentiality
61%
Directional Dependence
54%
Set-valued Data
54%
Aggregate Query
54%
Why-not
54%
Top-k Query
54%
Spatial Keyword
54%
Query Processing
47%
Location-based Services
47%
Knowledge Approach
40%
Fine-grained Access Control
40%
Zero-knowledge
40%
Blockchain
40%
Data Owner
39%
As-a-service
39%
Security Analysis
34%
Graph Model
34%
Optimization Techniques
34%
Social-aware
32%
Data Outsourcing
31%
Bike Stations
27%
Taxi Recommendation
27%
Bike-sharing System
27%
Trip Planning
27%
Blockchain Database
27%
Large-scale Image Retrieval
27%
Geo-social Group Query
27%
Extended Abstracts
27%
Boolean Range Query
27%
Shared Cloud Data
27%
Location Disclosure
27%
Message Authentication Code
27%
Community Search
27%
Modeling Algorithm
27%
Large Graphs
27%
Take-the-first
27%
Nearest Neighbor Query
27%
Data Summarization
27%
Ontological Basis
27%
Attribute-based
27%
Keyword-based
27%
Top-k Spatial Keyword Query
27%
Range Query
27%
2-tree
27%
Effective Structure
27%
Ride-sharing Services
27%
Graph Database
27%
Spatiotemporal
27%
Location Search
27%
Free Charge
27%
Reachability Query
27%
Data Cleaning
27%
Query Auto-completion
27%
Mobile Devices
27%
Graph Visualization
27%
Human Power
27%
Uncertain Graph
27%
Visual Query
27%
Probabilistic Reachability
27%
Query Keyword
27%
Cloud Computing
25%
Result Integrity
25%
Efficient Query
22%
Spatial Distance
21%
Service Provider
21%
Access Policy
20%
Query Suggestion
20%
Graph Query
20%
Authenticated Query
20%
Data Integrity
20%
Data Confidentiality
19%
Assurance Schemes
18%
Verifier
18%
Verification Object
18%
Integrity Assurance
18%
Authentication Mechanism
17%
Privacy-preserving Authentication
16%
Text Description
15%
Web Objects
15%
Graph Network
15%
Best Matches
15%
Spatial Keyword Query
15%
Geotag
15%
Distance Similarity
15%
Text Similarity
15%
Data Objects
15%
Why-questions
15%
Missing Object
15%
Query Refinement
15%
Refinement Techniques
15%
Authentication Scheme
15%
Real-world Application
15%
Social Distance
14%
Safe Zone
13%
Quality Guarantee
13%
Location Optimization
13%
Query Object
13%
Plan Optimization
13%
Merkle
13%
Medical Subject Headings (MeSH)
13%
Ontology Structure
13%
International Classification of Diseases
13%
Verifiable Query
13%
Access Management
13%
Search Experience
13%
Risk of Losing Control
13%
High Security Application
13%
Cloud Data
13%
Integrity Management
13%
Cloud-based
13%
Maintenance Cost
13%
Tree Structure
13%
Gene Ontology
13%
Spatial Search
13%
Text Relevance
13%
Approximation Guarantee
13%
Data Access
13%
Top-k Keywords
13%
Cryptocurrency
13%
Search Service
13%
Performance Evaluation
13%
Query Formulation
13%
Voronoi Cell
13%
Spatial Proximity
13%
Spatial Regions
13%
Common Data
13%
Third-party Providers
13%
Edge Selection
13%
Geo-textual Object
13%
Geo-textual Data
13%
Reverse Top-k Query
13%
Location-based Queries
13%
Exact Query
13%
Approximate Results
13%
Pruning Strategy
13%
Effective Algorithm
13%
Hybrid Storage
13%
Crowdsourcing
13%
Influence Zone
13%
Image Retrieval
13%
Market Analysis
13%
Greedy Algorithm
13%
Query Services
12%
Recent Advances
12%
System Settings
12%
Business Intelligence
12%
Authentication Performance
12%
Source Data
12%
Location-based Social Networks
10%
Social Networks
10%
Rental Cost
9%
Time-dependent Dynamics
9%
Detour Distance
9%
Station Networks
9%
Bike
9%
Detail Design
9%
Grid-based Method
9%
Selecting Candidates
9%
Free Ride
9%
Trip Distance
9%
Overhead Time
9%
Verification Time
9%
Query Cost
9%
Verification Cost
9%
Centralized Environment
9%
Signature Authentication
9%
Conventional Scheme
9%
Prefix
9%
Digital Text
9%
Verifiable Messages
9%
Plaintext
9%
Malicious Parties
9%
Spatio-temporal Data
9%
Design Index
9%
Smartphone-based
9%
Edge-based Method
9%
Spatial Analytics
9%
Route Planning
9%
Location Tracking
9%
Design Protocol
9%
Communication Cost
9%
Communication Overhead
9%
Search Space
9%
Query-based
9%
Ridesharing
9%
Distributed Environment
9%
Cohesion
9%
Detour
9%
Environmental Friendliness
9%
Spatial-temporal
9%
Optimization Algorithm
9%
Travel Time
9%
Time-based
9%
Digital Signature
9%
Design Techniques
9%
System Framework
9%
Shared Taxi
9%
Computer Science
Authentication
100%
Location-Based Service
86%
Social Network
81%
Experimental Result
72%
Cloud Computing
63%
Data Structure
62%
Query Processing
59%
Range Query
54%
Blockchain
54%
Grained Access Control
54%
Optimization Technique
53%
Service Provider
49%
Authentication Technique
45%
Social Distance
40%
Data Confidentiality
36%
Decision-Making
36%
Business Intelligence
36%
Security Analysis
34%
Data Integrity
32%
Performance Evaluation
32%
Design Technique
27%
Random Selection
27%
Data Cleaning
27%
Problem Selection
27%
Algorithm Selection
27%
Linear Programming Problem
27%
Frequent Subgraph
27%
World Application
27%
Knowledge Graph
27%
Collaboration and Communication
27%
Search Experience
27%
Future Direction
27%
Service Architecture
27%
Communication Network
27%
Integrity Management
27%
Network Community
27%
Application Area
27%
Access Management
27%
Community Detection
27%
Computation Time
27%
Message Authentication Code
27%
Solution Space
27%
Privacy Preserving
27%
Service to User
27%
Speed-up
27%
Baseline Method
27%
Subgraphs
27%
Mobile Device
27%
User Preference
27%
Graph Database
27%
Party Service Provider
27%
near neighbor query
27%
Sharing System
27%
Data Access
27%
Security Application
27%
Ontology
27%
Image Retrieval
27%
Index Structure
19%
authentication scheme
15%
Support Application
13%
Target Application
13%
Optimized Solution
13%
Algorithmic Efficiency
13%
Algorithm Correctness
13%
Planning Activity
13%
Keyword Search
13%
Search Space
13%
spatial index
13%
Spatial Proximity
13%
Social Networking (Online)
13%
Cryptocurrency
10%
Distributed Data Structure
9%
Centralized Environment
9%
Subject Heading
9%
Authentication Protocol
9%
Communication Overhead
9%
Greedy Algorithm
9%
Systems and Application
9%
Tracking (Position)
9%
Distributed Environment
9%
Data Analytics
9%
Digital Signature
9%
Spatiotemporal Data
9%
Computer Hardware
9%
Building-Blocks
9%
User Privacy
9%
Good Performance
9%
Approximation (Algorithm)
9%
Image Retrieval System
6%
Sized Enterprise
6%
Inverted Index
6%
Cloud Platform
6%
Design Strategy
6%
Information Retrieval
6%
Cloud Service Provider
6%
Search Engine
6%
Query Performance
5%
Metadata
5%
Consensus Protocol
5%
Access Control
5%
Security Concern
5%
Unauthorized User
5%
Critical Application
5%
Outsourced Data
5%