Keyphrases
Query Authentication
72%
Top-k Query
52%
Query Result
48%
Confidentiality
39%
Set-valued Data
35%
Aggregate Query
35%
Spatio-textual
35%
Spatial Keyword
35%
Why-questions
35%
Keyword Set
26%
Text Similarity
26%
Service Provider
24%
Missing Object
23%
Query Keyword
23%
Location-based Services
23%
Authentication Scheme
23%
Authentication Mechanism
22%
Verification Object
20%
O-Cost
20%
Data Owner
19%
Spatial Distance
18%
Multi-source Data
17%
Top-k Spatial Keyword Query
17%
Authenticated Query
17%
Why-not
17%
Similarity Join
17%
Online Data Integration
17%
Untrusted Cloud Environment
17%
Knowledge Approach
17%
Geo-social Group Query
17%
Extended Abstracts
17%
Fine-grained Access Control
17%
Zero-knowledge
17%
Cloud-based
17%
Web Objects
17%
Nearest Neighbor Query
17%
Service Integration
17%
Error Bound
17%
Keyword Search
17%
Filtering Framework
17%
Sweeper
17%
Data Integration
17%
Sensor Data Collection
17%
Authenticated Data Structures
16%
Geotag
14%
Index-based
14%
Query Services
14%
System Settings
13%
Access Policy
13%
Query Processing
13%
Data Confidentiality
12%
Spatio-textual Query
11%
Data Outsourcing
11%
Data Integrity
11%
Result Integrity
11%
Spatial Data
11%
Privacy-preserving Authentication
10%
Multi-source
10%
Communication Cost
10%
Take-the-first
10%
Optimization Techniques
10%
Security Analysis
10%
Cloud Computing
10%
User Issues
8%
Geospatial Web
8%
Distance Similarity
8%
Query Intent
8%
Descriptive Text
8%
Text Document
8%
Scoring Function
8%
Existing Techniques
8%
Index Traversal
8%
Multidimensional Data
8%
Query Integrity
8%
Recent Advances
7%
Business Intelligence
7%
As-a-service
7%
Authentication Performance
7%
Source Data
7%
Baseline Algorithm
7%
Data Update
7%
Location-based Social Networks
7%
Cloud Server
6%
Security Performance
6%
Outsourced Database
6%
Performance Evaluation
6%
Hybrid Index
5%
Performance Improvement
5%
Spatial Regions
5%
Actual Object
5%
Geometry Problems
5%
Ranking Function
5%
Patio
5%
Query Optimization
5%
Homomorphic Secret Sharing
5%
Spatial Keyword Query
5%
Reliability Issues
5%
Design Scheme
5%
Overhead Time
5%
Verification Time
5%
Query Cost
5%
Verification Cost
5%
Untrusted
5%
Similarity Threshold
5%
Untrusted Server
5%
Seal Design
5%
Centralized Environment
5%
Structure Scheme
5%
Data Reliability
5%
Data Consistency
5%
Authentication Code
5%
Distance Threshold
5%
Freshness
5%
Large Volume
5%
Query Refinement
5%
Understanding Why
5%
Design Properties
5%
Rank Estimation
5%
Two Dimensional
5%
Estimation Algorithms
5%
Computational Cost
5%
Spatial Analytics
5%
Communication Overhead
5%
Query-based
5%
Update Strategy
5%
Novel Hybrids
5%
Distributed Environment
5%
Index Structure
5%
Browsing
5%
Data Combination
5%
Similar Object
5%
K-nearest Neighbor (K-NN)
5%
Analytical Model
5%
Optimization Algorithm
5%
Query Interface
5%
Cluster-based
5%
Performance Metrics
5%
Cloud Service Provider
5%
Textual Information
5%
Data Suppression
5%
Network Traffic
5%
Computer Science
Authentication
100%
Service Provider
62%
Authentication Technique
48%
Input/Output
44%
Experimental Result
35%
authentication scheme
35%
Data Structure
32%
Privacy Preserving
28%
Cloud Computing
27%
Keyword Search
26%
Query Processing
24%
Data Confidentiality
23%
Decision-Making
23%
Business Intelligence
23%
Location-Based Service
23%
Authentication Data
19%
Scoring Function
17%
Ranking Function
17%
Party Cloud Service
17%
Data Integration Service
17%
Join Computation
17%
Distance Threshold
17%
Estimation Algorithm
17%
Grained Access Control
17%
Cloud Service Provider
17%
near neighbor query
17%
Social Network
17%
Cloud Environment
17%
Network Traffic
17%
Performance Metric
17%
Index Structure
14%
Security Analysis
12%
Optimization Technique
12%
Data Integration
11%
Multidimensional Data
9%
Application Scenario
8%
Query Optimization
8%
Communication Cost
8%
Computation Cost
8%
Lagrangian Relaxation
8%
Planning Activity
8%
Social Distance
8%
Computational Cost
8%
spatial index
8%
Spatial Information
8%
Network Protocols
8%
Social Networking (Online)
8%
Sensor Node
8%
Sensor Network
8%
Textual Information
8%
Wireless Sensor Network
8%
Network Configuration
8%
Data Source
7%
Critical Application
7%
Performance Evaluation
7%
Data Integrity
5%
Secret Sharing
5%
Integrated Data
5%
Data Consistency
5%
Integration Server
5%
Source Individual
5%
Data Reliability
5%
Distributed Data Structure
5%
Centralized Environment
5%
Authentication Protocol
5%
Communication Overhead
5%
Building-Blocks
5%
Distributed Environment
5%
Good Performance
5%
Analytical Model
5%
Data Analytics
5%