Keyphrases
Data Privacy
44%
Query Authentication
44%
Hierarchical Index
33%
Query Privacy
33%
Privacy-preserving Authentication
33%
Index Traversal
33%
Top-k Spatial Keyword Query
33%
Private Search
33%
Key-value Store
33%
Location-based Services
33%
Cloud Database
33%
Salary
33%
Outsourced Database
33%
Range Query
33%
Query Result
30%
Data Owner
27%
Service Provider
27%
Query Types
22%
Data Outsourcing
22%
Location-based
22%
Web Objects
16%
Verification Object
16%
Oblivious Transfer
16%
Secure Protocol
16%
Sensitive Attribute
16%
B+ Tree
16%
Secure multi-party Computation
16%
Database Indexing
16%
Traversal Path
16%
Indexing Methods
16%
Computing Paradigm
16%
Homomorphic Encryption
16%
Data Query
16%
Search Queries
16%
R-tree
16%
Performance Studies
16%
Communication Overhead
16%
Geospatial Web
16%
Homomorphic Encryption Scheme
16%
Security Performance
16%
As-a-service
16%
Security Analysis
16%
Computation Overhead
16%
Query Processing
16%
Cryptography
16%
Recent Advances
16%
Authentication Mechanism
13%
Privacy-preserving Query
11%
Authentication Module
11%
System Features
11%
Use Case Study
11%
Common Data
11%
User Experience
11%
Tree-based
11%
Authentication Scheme
11%
Query Services
11%
Mobile Operators
11%
User Location
11%
Low Communication
8%
Moving Query
8%
Geopositioning
8%
Spatial Search
8%
Computation Cost
8%
Text Relevance
8%
Mobile Use
8%
Cost Consideration
8%
Client-side
8%
Mobile Client
8%
Hackers
8%
Communication Cost
8%
Low Computation
8%
Order of Magnitude
8%
Best Matches
8%
Baseline Algorithm
8%
Real-time Query
5%
Private Assets
5%
Harassment
5%
SQL Azure
5%
SimpleDB
5%
Query Model
5%
Sensitive Field
5%
Bigtable
5%
Microsoft
5%
Amazon
5%
Data Value
5%
Verification Process
5%
Interactive Query
5%
Hong Kong Society
5%
Oracle
5%
Google
5%
Data Security
5%
Computer Science
Authentication
100%
Data Privacy
41%
Service Provider
41%
Homomorphic Encryption
33%
Privacy Preserving
33%
Range Query
33%
Location-Based Service
33%
Data Structure
23%
Indexing Technique
16%
Sensitive Attribute
16%
Research Problem
16%
Secure Protocol
16%
Communication Overhead
16%
Communication Cost
16%
Keyword Search
16%
Authentication Data
16%
Computation Cost
16%
secure multiparty computation
16%
computing paradigm
16%
Authentication Technique
16%
Query Processing
16%
Security Analysis
16%
Large Data Set
16%
Research Community
13%
Authentication Capability
8%
Authentication Module
8%
authentication scheme
8%
User Experience
8%
Case Study
8%
Service Model
8%
Use Case
8%
Mobile Operator
8%
Verification Process
6%
Data-Value
6%
Structured Query Language
6%
Data Type
6%
Authentication Method
6%
Data Security
6%